National Library of Energy BETA

Sample records for deutsche securities korea

  1. Image, Incorporated : a study of securities buildings in Seoul, Korea

    E-Print Network [OSTI]

    Chang, Ji-in

    1992-01-01

    This study deals with the images of corporate high-rises in Seoul, Korea, the main city of a rapidly growing industrial nation. The questions explored concern mainly the images of office high-rises. Five multi-story ...

  2. Pacific Basin Nuclear Conference (PBNC 2012), BEXCO, Busan, Korea, March 18 ~ 23, 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS

    E-Print Network [OSTI]

    Kim, Kwangjo

    PBNC 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS Kwangjo Kim KAIST, Daejeon, Korea.kim@kustar.ac.ae Abstract Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing improvement. 1. Introduction Nuclear Power Plants (NPPs) become one of the most important infrastructures

  3.  A Civilian Perspective on DefenseTransparency in the Republic of Korea: The More, the Better?

    E-Print Network [OSTI]

    Choi, Kang

    2011-01-01

    and thus undermining the national security of South Korea by1960s to 1980s), these national security considerations wereoften suppressed on national security grounds and almost

  4. An Illustration of the Deutsch-Jozsa Algorithm Frank Rioux

    E-Print Network [OSTI]

    Rioux, Frank

    . The modification of this circuit (Deutsch-Jozsa algoritm) highlighted below answers the question of whether

  5. An Illustration of the Deutsch-Jozsa Algorithm Frank Rioux

    E-Print Network [OSTI]

    Rioux, Frank

    of this circuit (Deutsch-Jozsa algoritm, p. 298 in The Quest for the Quantum Computer, by Julian Brown) answers

  6. Polymers in a Vacuum J. M. Deutsch

    E-Print Network [OSTI]

    Deutsch, Josh

    Polymers in a Vacuum J. M. Deutsch Department of Physics, University of California, Santa Cruz polymer molecules are found in a vacuum, and here we examine their properties. Angular momentum The properties of polymer chains have been investigated extensively over the past 50 years [1], but the vast

  7. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  8. Deutsche Telekom to offer Microsoft Office on a monthly payment plan Jun 11, 2009

    E-Print Network [OSTI]

    Deutschmann, Rainer

    Deutsche Telekom to offer Microsoft Office on a monthly payment plan Jun 11, 2009 · Customers able · Offer available first to T-Mobile Austria mobile broadband customers and Deutsche Telekom business customers in Germany from Q3 2009 · Deutsche Telekom is the first telecommunications provider to offer

  9. Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron

    E-Print Network [OSTI]

    physics or astrophysics · Experience with the radiation modeling of nonthermal sources and/or the propagation of cosmic radiation (cosmic rays, neutrinos, gamma- rays), or experience in neutrino physics be send to recruitment@desy.de Deutsches Elektronen-Synchrotron DESY Human Resources Department | Code: EP

  10. Optical Antennas Palash Bharadwaj, Bradley Deutsch, and Lukas Novotny*

    E-Print Network [OSTI]

    Novotny, Lukas

    is to convert the energy of free propagating radiation to localized energy, and vice versa. Optical antennas exOptical Antennas Palash Bharadwaj, Bradley Deutsch, and Lukas Novotny* Institute of Optics author: www.nano-optics.org Received March 12, 2009; revised July 4, 2009; accepted July 8, 2009; posted

  11. Policy Paper 36: Energy and Security in Northeast Asia: Supply and Demand, Conflict and

    E-Print Network [OSTI]

    Fesharaki, Fereidun; Banaszak, Sarah; WU, Kang; Valencia, Mark J.; Dorian, James P.

    1998-01-01

    Energy and Security in Northeast Asia: Supply and Demand,Policy Papers 35- 37, Energy and Security in Northeast Asia,on Northeast Asian energy and security held in Seoul, Korea.

  12. Transactions of the Korean Nuclear Society Autumn Meeting PyeongChang, Korea, October 25-26, 2007

    E-Print Network [OSTI]

    Kim, Kwangjo

    and Control Dept., Korea Institute of Nuclear Safety, {k407kyd,dikim}@kins.re.kr *** Reactor Engineering the cyber security policy for digital instrumentation and control (I&C) systems in nuclear power plants. 2Transactions of the Korean Nuclear Society Autumn Meeting PyeongChang, Korea, October 25-26, 2007

  13. An Application of the Deutsch-Jozsa Algorithm to Formal Languages and the Word Problem in

    E-Print Network [OSTI]

    Severini, Simone

    An Application of the Deutsch-Jozsa Algorithm to Formal Languages and the Word Problem in Groups and nontrivial words in groups given by finite presenta- tions, under the promise that a word is of a certain some consequences for the word problem in groups with a particular kind of presentation. 1 The Deutsch

  14. Technology Review in English | en Espaol | auf Deutsch | in Italiano | | in India Newsletters

    E-Print Network [OSTI]

    Rogers, John A.

    Technology Review in English | en Espańol | auf Deutsch | in Italiano | | in India Home· Videos· Blogs· Briefings· Community· Magazine· Newsletters· Events· Resources· · · · · · Subscribe· Computing Course for NASA· The Magazine Subscriber Services Page 1 of 4Technology Review: TR10: Implantable

  15. Technology Review in English | en Espaol | auf Deutsch | in Italiano | Newsletters

    E-Print Network [OSTI]

    Rogers, John A.

    Technology Review in English | en Espańol | auf Deutsch | in Italiano | Home· Videos· Blogs videos » LOG IN Username Password Submit Forgot your password? Register » Page 1 of 4Technology Review

  16. Technology Review in English | en Espaol | auf Deutsch | in Italiano | | in India Newsletters

    E-Print Network [OSTI]

    Rogers, John A.

    Technology Review in English | en Espańol | auf Deutsch | in Italiano | | in India Home· Videos· Blogs· Briefings· Community· Magazine· Newsletters· Events· Resources· · · · · · Subscribe· Computing of 4Technology Review: Cheap Electronics on Paper Diagnostic Chips 10/25/2010http

  17. Deutsche Telekom launches new integrated location-based services in selected markets across Europe

    E-Print Network [OSTI]

    Deutschmann, Rainer

    Deutsche Telekom launches new integrated location-based services in selected markets across Europe Telekom announces a range of innovative location-based services in selected markets across Europe

  18. Hybrid and optical implementation of the Deutsch-Jozsa algorithm

    E-Print Network [OSTI]

    Luis A. Garcia; Jagdish R. Luthra

    2009-12-31

    A hybrid model of the Deutsch-Jozsa algorithm is presented, inspired by the proposals of hybrid computation by S. Lloyd and P. van Loock et. al. The model is based on two observations made about both the discrete and continuous algorithms already available. First, the Fourier transform is a single-step operation in a continuous-variable (CV) setting. Additionally, any implementation of the oracle is nontrivial in both schemes. The steps of the computation are very similar to those in the CV algorithm, with the main difference being the way in which the qunats, or quantum units of analogic information, and the qubits interact in the oracle. Using both discrete and continuous states of light, linear devices, and photo-detection, an optical implementation of the oracle is proposed. For simplicity, infinitely squeezed states are used in the continuous register, whereas the optical qubit is encoded in the dual-rail logic of the KLM protocol. The initial assumption of ideal states as qunats will be dropped to study the effects of finite squeezing in the quality of the computation.

  19. Health impact assessment in Korea

    SciTech Connect (OSTI)

    Kang, Eunjeong; Lee, Youngsoo; Harris, Patrick; Koh, Kwangwook; Kim, Keonyeop

    2011-07-15

    Recently, Health Impact Assessment has gained great attention in Korea. First, the Ministry of Environment introduced HIA within existing Environment Impact Assessment. Second, the Korea Institute for Health and Social Affairs began an HIA program in 2008 in alliance with Healthy Cities. In this short report, these two different efforts are introduced and their opportunities and challenges discussed. We believe these two approaches complement each other and both need to be strengthened. We also believe that both can contribute to the development of health in policy and project development and ultimately to improvements in the Korean population's health.

  20. From Globalisation to Liquidation: The Deutsch-Asiatische Bank and the First World War in China

    E-Print Network [OSTI]

    Moazzin, G.

    2015-07-30

    of the liquidation regulations that excluded enemy debtors from the liquidation. The Times article called on the Allied governments to “enforce the liquidation of the Deutsch- Asiatische Bank,” which it called the “keystone of the German commercial system in China... Faber asked Foreign Secretary Balfour “why the Deutsch- Asiatische Bank, which is the keystone of the German commercial system in China, has not been put into liquidation; and when it is likely to be so put?” Balfour’s reply was that the Allied...

  1. Visit to the Yongbyon Nuclear Facilities in North Korea

    SciTech Connect (OSTI)

    Hecker, Siegfried S.

    2004-02-07

    Actions of the Government of the Democratic People's Republic of Korea have precipitated two nuclear crises in the past 10 years. The 1994 crisis was resolved through the 'Agreed Framework.' North Korea agreed to 'freeze' and eventually dismantle its nuclear program (with U.S. help to store spent fuel safely and under IAEA inspection). In return, the United States agreed (with the KEDO international consortium) to build two light-water reactors and supply North Korea with heavy-fuel oil until the reactors come on line. In addition, both sides agreed to move towards full normalization of relations, work for peace and security on a nuclear-free Korean Peninsula, and work on strengthening the international nonproliferation regime. The second nuclear crisis erupted when North Korean Government officials allegedly admitted to having a clandestine uranium enrichment program when confronted with this accusation by U.S. officials in October 2002. The United States (through KEDO) suspended heavy-fuel oil shipments and North Korea responded by expelling the IAEA inspectors, withdrawing from the Nuclear Nonproliferation Treaty, and restarting its nuclear program in January 2003. The North Korean Government has invited Professor John Lewis of Stanford University, a China and North Korea scholar, for Track I1 discussions of nuclear and other key issues since 1987. In August 2003, Professor Lewis visited North Korea just before the first six-party talks, which were designed by the United States to solve the current nuclear crisis. Professor Lewis was invited back for the January 2004 visit. He asked Jack Pritchard, former U.S. special envoy for DRPK negotiations, and me to accompany him. Two Asian affairs staff specialists from the U.S. Senate Foreign Relations Committee also joined us. I will report on the visit to the Yongbyon Nuclear Scientific Research Center on January 8,2004. We toured the 5 MWe reactor, the 50 MWe reactor construction site, the spent fuel pool storage building, and the radiochemical laboratory. We concluded that North Korea has restarted its 5 MWe reactor (which produces roughly 6 kg of plutonium annually), it removed the 8000 spent fuel rods that were previously stored under IAEA safeguards from the spent fuel pool, and that it most likely extracted the 25 to 30 kg of plutonium contained in these fuel rods. Although North Korean officials showed us what they claimed was their plutonium metal product from this reprocessing campaign, we were not able to conclude definitively that it was in fact plutonium metal and that it came from the most recent reprocessing campaign. Nevertheless, our North Korean hosts demonstrated that they had the capability, the facility and requisite capacity, and the technical expertise to produce plutonium metal. We were not shown any facilities or had the opportunity to talk to technical or military experts who were able to address the issue of whether or not North Korea had a 'deterrent' as claimed - that is, we were not able to conclude that North Korea can build a nuclear device and that it can integrate nuclear devices into suitable delivery systems. On the matter of uranium enrichment programs, Vice Minister Kim Gye Gwan categorically denied that North Korea has a uranium enrichment program - he said, 'we have no program, no equipment, and no technical expertise for uranium enrichment.' Upon return to the United States, I shared my observations and analysis with U.S. Government officials in Washington, DC, including congressional testimony to the Senate Foreign Relations Committee and briefings to two House of Representative Committees.

  2. TSV Stress-Aware ATPG for 3D Stacked ICs Sergej Deutsch, Krishnendu Chakrabarty

    E-Print Network [OSTI]

    Lim, Sung Kyu

    TSV Stress-Aware ATPG for 3D Stacked ICs Sergej Deutsch, Krishnendu Chakrabarty Department--Thermo-mechanical stress due to TSV fabrication pro- cesses is a major concern in 3D integration. TSV stress not only are generated with TSV stress-oblivious circuit models. We evaluate the impact on TSV stress on delay testing

  3. Scaling of Polymers in Aligned Rods J. M. Deutsch and M. Warkentin

    E-Print Network [OSTI]

    Deutsch, Josh

    Scaling of Polymers in Aligned Rods J. M. Deutsch and M. Warkentin Department of Physics December 2005) We study the behavior of self-avoiding polymers in a background of infinitely long that in both cases the polymer chains are highly elongated, with vertical and horizontal size exponents

  4. October 10th Daejeon Convention Center, KOREA

    E-Print Network [OSTI]

    using pilot devices during the construction phase of International Thermonuclear Experimental Reactor Thermonuclear Experimental Reactor European Union Russia China Japan United States of America India Korea #12

  5. Korea's Green Growth Strategy: Mitigating Climate Change and...

    Open Energy Info (EERE)

    Korea's Green Growth Strategy: Mitigating Climate Change and Developing New Growth Engines Jump to: navigation, search Name Korea's Green Growth Strategy: Mitigating Climate Change...

  6. Sunpower Korea | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-Enhancing CapacityVectren)Model for theSunLan SolarKorea Jump to: navigation, search

  7. Potential Collaborative Research topics with Korea’s Agency for Defense Development

    SciTech Connect (OSTI)

    Farrar, Charles R.; Todd, Michael D.

    2012-08-23

    This presentation provides a high level summary of current research activities at the Los Alamos National Laboratory (LANL)-University of California Jacobs School of Engineering (UCSD) Engineering Institute that will be presented at Korea's Agency for Defense Development (ADD). These research activities are at the basic engineering science level with different level of maturity ranging from initial concepts to field proof-of-concept demonstrations. We believe that all of these activities are appropriate for collaborative research activities with ADD subject to approval by each institution. All the activities summarized herein have the common theme that they are multi-disciplinary in nature and typically involved the integration of high-fidelity predictive modeling, advanced sensing technologies and new development in information technology. These activities include: Wireless Sensor Systems, Swarming Robot sensor systems, Advanced signal processing (compressed sensing) and pattern recognition, Model Verification and Validation, Optimal/robust sensor system design, Haptic systems for large-scale data processing, Cyber-physical security for robots, Multi-source energy harvesting, Reliability-based approaches to damage prognosis, SHMTools software development, and Cyber-physical systems advanced study institute.

  8. Speakers: Adam Sieminski, Deutsche Bank Stephen P. A. Brown, Resources for the Future

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979 1.988 1.996Deutsche Bank AG Oil &Setting-P.Spark5:

  9. Security Policies in East Asia: Four Essays

    E-Print Network [OSTI]

    Lee, Chae-Jin

    1982-01-01

    of South Korea Young C. Kim 66 List of Contributors 79 Cover Painting by Dong Shouping (1904 - ) iii Preface In the spring semester of 1981 the Center for East Asian Studies at the University of Kansas sponsored a "Colloquium on Asian Security... Perceptions of Asian Security Akira Iriye After a hiatus following the war in Vietnam, the question of Asian security seems once again to be agitating the governments of America and Asia. Does the increasing naval presence of the Soviet Union in the region...

  10. The consumer Internet in South Korea : an American's perspective

    E-Print Network [OSTI]

    Byun, Jeffrey

    2008-01-01

    This thesis will explore the consumer internet industry in South Korea from the perspective of an American with Western values and sensibilities. South Korea is widely considered to be one of the most connected and ...

  11. International diffusion practice : lessons from South Korea's New Village Movement

    E-Print Network [OSTI]

    Kim, Jung Hwa, M.C.P. Massachusetts Institute of Technology

    2013-01-01

    This research focuses on how South Korea's development model-namely, the Saemaul Undong, or the New Village Movement-is diffused internationally, in particular, to the developing country of Vietnam. South Korea's successful ...

  12. Fiber-Optics Implementation of the Deutsch-Jozsa and Bernstein-Vazirani Quantum Algorithms with Three Qubits

    E-Print Network [OSTI]

    Cerf, Nicolas

    Fiber-Optics Implementation of the Deutsch-Jozsa and Bernstein-Vazirani Quantum Algorithms-Vazirani quantum algorithms for 8-point functions. The measured visibility of the 8-path interferometer is about 97 application is the concept of quantum algorithms, which allow certain problems such as factorization [1

  13. 2006200620062006 Taiwan-Korea Plasma Conference 2006

    E-Print Network [OSTI]

    Hsu, Jang-Yu

    2006200620062006 Taiwan-Korea Plasma Conference 2006 (subject to change without notice) Time: 1 Electron Acceleration C. S. Liu, National Central University, ChongLi, Taiwan Solar coronal heating, Taiwan Nonlinear analysis of the edge turbulence in a Hanbit mirror plasma, Chang-Mo Ryu Department

  14. South Korea: Hi-Tech Mecca

    E-Print Network [OSTI]

    Hacker, Randi; Tsutsui, William

    2005-10-12

    Broadcast Transcript: Greetings from South Korea, hi-tech Mecca. According to the San Francisco Chronicle, practically the entire country now has access to broadband speeds of up to 20 megabits per second. Compare that to a paltry 4 megabits per...

  15. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  16. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  17. South Korea - NETL Cooperation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-Enhancing Capacity forSiliciumEnergyHouston, Texas: Energy ResourcesKensington,Korea -

  18. Development of an Integrated Natural Barrier Database System for Site Evaluation of a Deep Geologic Repository in Korea - 13527

    SciTech Connect (OSTI)

    Jung, Haeryong; Lee, Eunyong; Jeong, YiYeong; Lee, Jeong-Hwan

    2013-07-01

    Korea Radioactive-waste Management Corporation (KRMC) established in 2009 has started a new project to collect information on long-term stability of deep geological environments on the Korean Peninsula. The information has been built up in the integrated natural barrier database system available on web (www.deepgeodisposal.kr). The database system also includes socially and economically important information, such as land use, mining area, natural conservation area, population density, and industrial complex, because some of this information is used as exclusionary criteria during the site selection process for a deep geological repository for safe and secure containment and isolation of spent nuclear fuel and other long-lived radioactive waste in Korea. Although the official site selection process has not been started yet in Korea, current integrated natural barrier database system and socio-economic database is believed that the database system will be effectively utilized to narrow down the number of sites where future investigation is most promising in the site selection process for a deep geological repository and to enhance public acceptance by providing readily-available relevant scientific information on deep geological environments in Korea. (authors)

  19. The Prospective Free Trade Agreement with Korea: Background, Analysis, and Perspectives for California Agriculture

    E-Print Network [OSTI]

    Lee, Hyunok; Sumner, Dan

    2009-01-01

    Korea-United States Free Trade Agreement. ” Policy Briefs inFact Sheet: U.S. -Korea Free Trade Agree- ment—Bene?ts for09-2 ii The Prospective Free Trade Agreement with Korea:

  20. South Korea–U.S. free trade agreement will lower export barriers for California products

    E-Print Network [OSTI]

    Lee, Hyunok; Sumner, Daniel A

    2011-01-01

    DA. 2009. The Prospective Free Trade Agreement with Korea:Index.html. USTR. 2011. Free trade agreements. www.ustr.gov/trade-agreements/free-trade-agreements. South Korea

  1. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  2. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  3. 1 INTRODUCTION Korea has a long history of earthquakes. Earthquake

    E-Print Network [OSTI]

    Spencer Jr., Billie F.

    1 INTRODUCTION Korea has a long history of earthquakes. Earthquake events are well documented by those historic and recent earthquakes was not very high, and it is believed that Korea belongs to a low to moderate seismicity zone. However, after the Northridge and Kobe earthquakes, there was a growing concern

  4. SolarWorld Korea | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-Enhancing Capacity forSilicium deEnergyCompanySolarLab JumpSolarStructureKorea Jump

  5. AstroKorea | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex A SOpenAshley, Ohio: Energy-ResourceAstha ProjectsAstroKorea

  6. North Korea: The next nuclear nightmare

    SciTech Connect (OSTI)

    Spector, L.S.; Smith, J.R.

    1991-03-01

    The crisis in the Persian Gulf has reawakened concerns over the spread of nuclear arms. Even before its invasion of Kuwait, Iraq's history of aggression and support for international terrorism triggered fears in Washington that its acquisition of nuclear weapons might damage international stability and US interests far more than the emergence of India, Israel, Pakistan, and South Africa as de facto nuclear powers. Thus, when the Gulf War began on January 16, Iraq's nuclear sites were among the first attacked by allied air strikes. Unfortunately, Iraq has not been the only hostile proliferator looming on the horizon. North Korea, which has been no less dedicated than Iraq to the use of violence to advance its expansionist goals, has also tenaciously pursued a nuclear-weapons capability. Moreover, the North Korean program is considerably closer to bearing fruit than the Iraqi effort. And although North Korea, like Iraq, has signed the Nuclear Nonproliferation Treaty, unlike Iraq it has refused to conclude the safeguards agreement with the International Atomic Energy Agency that the treaty requires.

  7. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  8. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  9. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  10. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  11. An assessment of North Korea's nuclear weapons capabilities

    E-Print Network [OSTI]

    Sivels, Ciara (Ciara Brooke)

    2013-01-01

    In February of 2013, North Korea conducted its third nuclear weapons test. Speculations are that this test was conducted to further develop a warhead small enough to fit on an intercontinental ballistic missile. This test ...

  12. North Korea: Scenarios from the Perspective of Refugee Displacement

    E-Print Network [OSTI]

    Mahr, Christian F.

    Some 10,000 to 300,000 citizens of the Democratic People's Republic of Korea (DPRK) are currently reported to be living illegally in the Northeastern provinces of China. Based on bilateral treaties between the two countries, ...

  13. Spell "Cool" K-O-R-E-A

    E-Print Network [OSTI]

    Hacker, Randi; Tsutsui, William

    2006-04-05

    Broadcast Transcript: Here in Beijing's Xidan shopping center, the hot shop is Korea City and the hot ticket items include hip-hop clothing, movies, music, cosmetics and other products that bespeak Korean chic, and Chinese ...

  14. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  15. UGA Connections with South Korea UGA has many valuable connections with South Korea, providing opportunities for meaningful educational

    E-Print Network [OSTI]

    Arnold, Jonathan

    Master's program in Public Administration and Policy; Collaboration in area of Family and Consumer research in area of Child and Family Development Hanyang University Seoul Collaborative research opportunities for meaningful educational experiences and collaborative research. UGA Students in South Korea

  16. Beam Based Alignment of the TESLA X-ray FEL undulators Deutsches Elektronen-Synchrotron (DESY), Notkestr. 85, 22607 Hamburg, Germany

    E-Print Network [OSTI]

    Beam Based Alignment of the TESLA X-ray FEL undulators B. Faatz Deutsches Elektronen the performance of the FEL is the overlap between electron beam and radiation field during the amplification The TESLA X-ray FEL laboratory is a proposed user facility in the wavelength range between Ľ Ĺ and 6 nm

  17. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  18. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  19. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  20. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  1. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  4. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  5. South Korea Manages Globalization: Strategies of Self-Definition and Cultural Preservation 

    E-Print Network [OSTI]

    Stewart, Evan W

    2014-04-10

    The nation of South Korea transitioned from being one of the poorest countries worldwide to becoming the 15th largest economy. South Korea has attempted to manage globalization by actively developing and supporting cultural based entertainment...

  6. Electricity privatization : should South Korea privatize its state-owned electric utility?

    E-Print Network [OSTI]

    Lim, Sungmin

    2011-01-01

    The state-owned electric utility, Korea Electricity Power Cooperation (KEPCO), privatization has been a key word in South Korea since 1997, when the government received $55 billion from the International Monetary Fund in ...

  7. Borderland Intimacies: GIs, Koreans, and American Military Landscapes in Cold War Korea

    E-Print Network [OSTI]

    Hwang, Whitney Taejin

    2010-01-01

    Press, Goedde, Petra. GIs and Germans: Culture, Gender, andFor many young American GIs, Korea was the “first strangeof Prostitutes in American GIs Town in Korea”]. Master’s

  8. South Korea–U.S. free trade agreement will lower export barriers for California products

    E-Print Network [OSTI]

    Lee, Hyunok; Sumner, Daniel A

    2011-01-01

    Exports Imports South Korea Exports Imports Bilateral tradeU.S. exports to South Korea (South Korean imports fromStates) Share of U.S. exports (%) Share of South Korean

  9. Country hedging for real income stabilization: a case study of South Korea and Egypt

    E-Print Network [OSTI]

    Gordon, Kathryn M.; Rausser, Gordon C.

    1984-01-01

    It Manageable in the Case of Egypt?" Journal of Modeling, 2:S1UDY OF SOUIH KOREA AND EGYPT by Kathryn M. llirdon andSTUDY OF SOUTII KOREA AND EGYPT* By Kathryn M. Gordon and

  10. Welfare politics and social policy of coal workers’ pneumoconiosis in Britain and South Korea 

    E-Print Network [OSTI]

    Yoo, Bumsang

    2009-01-01

    This objective of this thesis is to explore welfare politics and welfare policy in Britain and South Korea (hereafter Korea) focusing on ex-miners with coal workers’ pneumoconiosis (hereafter CWP) and laws and institutions ...

  11. The Division System in Crisis: Essays on Contemporary Korea

    E-Print Network [OSTI]

    Nak-chung, Paik

    2011-01-01

    no corresponding phase of a national security campaign afternet, and the revised National Security Planning Agency Law222n4, 228n3 Index National Security Planning Agency Law,

  12. Global Shipbuilding, Who Will be the Leader? South Korea or China?

    E-Print Network [OSTI]

    Dan, Yong Jin

    2007-12-14

    positive. An expected boom in the LNG market is a good sign for both South Korea and China. The cruise ship market is another opportunity for South Korea to remain competitive in the future. Consequently, South Korea and China may have bright futures...

  13. Seoul, South Korea -classification deteriorating slope stability -Robert Hack 1 SLOPE STABILITY CLASSIFICATION

    E-Print Network [OSTI]

    Hack, Robert

    Seoul, South Korea - classification deteriorating slope stability - Robert Hack 1 SLOPE STABILITY CLASSIFICATION OF TIME DEPENDENT DETERIORATING SLOPES Seoul, Korea, 29 February 2008 Robert Hack Engineering) The Netherlands #12;Seoul, South Korea - classification deteriorating slope stability - Robert Hack 2 Jan van

  14. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  15. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  16. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  17. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  1. Renovated Korean nuclear safety and security system: A review and suggestions to successful settlement

    SciTech Connect (OSTI)

    Chung, W. S.; Yun, S. W.; Lee, D. S.; Go, D. Y.

    2012-07-01

    Questions of whether past nuclear regulatory body of Korea is not a proper system to monitor and check the country's nuclear energy policy and utilization have been raised. Moreover, a feeling of insecurity regarding nuclear safety after the nuclear accident in Japan has spread across the public. This has stimulated a renovation of the nuclear safety regime in Korea. The Nuclear Safety and Security Commission (NSSC) was launched on October 26, 2011 as a regulatory body directly under the President in charge of strengthening independence and nuclear safety. This was a meaningful event as the NSSC it is a much more independent regulatory system for Korea. However, the NSSC itself does not guarantee an enhanced public acceptance of the nuclear policy and stable use nuclear energy. This study introduces the new NSSC system and its details in terms of organization structure, appropriateness of specialty, budget stability, and management system. (authors)

  2. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  4. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  5. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  6. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  7. Study Abroad in South Korea Construction Management & Civil Engineering

    E-Print Network [OSTI]

    Hutcheon, James M.

    Study Abroad in South Korea Construction Management & Civil Engineering In July of 2014 the student of the Department of Civil Engineering and Construction Management at Georgia Southern University were given of Civil Engineering and Construction Management at Georgia Southern University. Throughout the entire

  8. Korea Institute of Energy Research Seong-Ryong Park

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    Economic Outlook Energy consumption status (1) Energy consumption status by sector '00 '05 '10 Energy hydrogen energy Solar PV Solar heating Bio- energy Wind Turbines hydraulic power Ocean power Scrapped1 2012. 11 Korea Institute of Energy Research Seong-Ryong Park #12;2 Basic shortage in energy

  9. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  10. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  12. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  13. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  14. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  15. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  16. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  17. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  18. Source: Proceedings of the US-Korea Workshop on Smart Structural Systems, Pusan, Korea, August 23-Laboratory and Field Validation of a Wireless Sensing Unit Design for

    E-Print Network [OSTI]

    Lynch, Jerome P.

    Source: Proceedings of the US-Korea Workshop on Smart Structural Systems, Pusan, Korea, August 23 with a series of tests conducted in the laboratory and the field. In particular, the Alamosa Canyon Bridge of installing a monitoring system in the Tsing Ma suspension bridge was reported over $27,000 per sensing

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  20. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  1. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  2. Fusion Energy Development in Korea Current Activities and Development

    E-Print Network [OSTI]

    energy source by technological development and the commercialization of fusion energy Phase Policy Goal in NFRI · KSTAR Experiment Building · NFRI HQ (including ITER Korea) · Home for K-DEMO Design 5 #12;KSTAR, N Superconductor Heating /CD PFC 1.8 m 0.5 m 2.0 0.8 DN, SN 2.0 MA 3.5 T 300 s 5.0 Nb3Sn, NbTi ~ 28

  3. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  4. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  5. Case Studies from the Climate Technology Partnership: Landfill Gas Projects in South Korea and Lessons Learned

    SciTech Connect (OSTI)

    Larney, C.; Heil, M.; Ha, G. A.

    2006-12-01

    This paper examines landfill gas projects in South Korea. Two case studies provide concrete examples of lessons learned and offer practical guidance for future projects.

  6. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  7. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  8. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  9. Deutsch-Franzsische Energiezukunft

    E-Print Network [OSTI]

    Stein, Oliver

    mit Referenten aus Forschung, Industrie- und Arbeitswelt und Politik Themen: Energiewende, Europäische

  10. Deutsche Telekom launches International Competence Center to drive global Machine-to-Machine (M2M) innovation

    E-Print Network [OSTI]

    Deutschmann, Rainer

    fixed-network lines and approximately 17 million broadband lines (as of September 30, 2009). Its product and connectivity provider. The competence center will focus on M2M products and services in nine different market, security, retail & commerce, industrial automation monitoring and control, healthcare and public sector

  11. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  12. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  13. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  14. REPORT from ISWA 2011 WORLD CONGRESS 17-20 October 2011, DAEGU, KOREA

    E-Print Network [OSTI]

    Columbia University

    of Environment of Korea, and Korea Society of Waste Management. Many Local companies like GS Caltex, Samsung is landfilled. This country has now the 3rd most sustainable waste management in Asia (after Japan and Singapore Production ­ Fuell Cell Power by Plasma Gasification of Municipal Solid Waste", Mr. Jorgen Haukohl from

  15. Culturally Variable Preferences for Robot Design and Use in South Korea, Turkey, and the United States

    E-Print Network [OSTI]

    Sabanovic, Selma

    Culturally Variable Preferences for Robot Design and Use in South Korea, Turkey, and the United@indiana.edu ABSTRACT Based on the results of an online survey conducted with participants in South Korea (N=73), Turkey, Turkey, United States, survey, robot design, robot application, user preferences. 1. INTRODUCTION

  16. Japan, France Vying for Korea's Nuclear Project By Cho Jin-seo

    E-Print Network [OSTI]

    Japan, France Vying for Korea's Nuclear Project By Cho Jin-seo Staff Reporter France and Japan. Haignere promised privileges in fusion energy businesses and supports for Korea's own fusion energy December but didn't express its official stand so far. Fusion is a relatively safe, clean and sustainable

  17. Eos, Vol. 88, No. 14, 3 April 2007 North Korea carried out a widely reported

    E-Print Network [OSTI]

    Eos, Vol. 88, No. 14, 3 April 2007 North Korea carried out a widely reported nuclear explosion on 9 activity in this area suspected to be indicative of North Korea preparing to conduct nuclear tests? The answer was quickly shown to be affirmative based on seismic data. Second, was it really a nuclear test

  18. hal-00585316,version1-12Apr2011 Korea nuclear exports: Why did the Koreans win the UAE tender?

    E-Print Network [OSTI]

    el nce ns win t xportin the ng 80 hal-00585316,version1-12Apr2011 #12;2 Korea nuclear exports: Why did the Koreans win the UAE tender? Will Korea achieve its goal of exporting 80 nuclear reactors time, due to the important barriers to enter into the nuclear export market in the UAE, Korea has had

  19. MHK Projects/South Korea | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource HistoryScenarios Towards 2050 JumpCoosSlough Bend < MHK Projects Jump to:Korea

  20. Korea Hydro and Nuclear Power Company, Ltd Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> Known Issues KnownKorea

  1. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  2. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  3. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  4. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  5. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  6. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  7. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  8. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  9. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  10. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  11. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  13. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  14. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  15. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  16. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  17. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  18. The behavior of trace metals in the Geum Estuary, Korea

    SciTech Connect (OSTI)

    Byrd, J.T.; Smith, R.G.; Windom, H.L. (Skidaway Inst. of Oceanography, Savannah, GA (United States)); Lee, Kwang, W. (Hanyang Univ. Ansan, Kyunggi (Korea)); Lee, Dong, S. (Korea Ocean Research and Development Inst., Ansan, Kyunggi (Korea))

    1991-05-01

    The distributions of trace metals in the Geum Estuary of western Korea were studied with regard to changes in other estuarine chemical parameters. Dissolved oxygen, pH, and alkalinity increased with increasing salinity. Dissolved aluminum concentrations increased at low salinities and were perhaps influenced by the solubility of particulate aluminosilicate phases. Iron, manganese, cobalt, and zinc are removed from solution in the low salinity end of the estuary. Cobalt and nickel have mid-estuary concentration maxima that may be due to an anthropogenic source. Cadmium, copper, lead, and zinc concentrations also increased in the estuary, possibly as th result of remobilization in the sediments. Cadmium increases are also linked to remineralization from tidal flat sediments in the outer estuary. The source of an increase in dissolved lead at low salinity is unclear, but may be due to release from particles.

  19. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  20. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  1. Urban settlement design, Seoul, Korea : a comparative study for low-income housing

    E-Print Network [OSTI]

    Je, Hae-Seong

    1982-01-01

    The study proposes an alternative design approach for urban dwelling environments of the low-income sectors in Seoul, Korea, based upon a comparative evaluation of the physical and socio-economic performance of the existing ...

  2. Holy Mother of Chiri Mountain: A Female Mountain Spirit in Korea

    E-Print Network [OSTI]

    Stiller, Maya

    2011-01-01

    pilgrimage route in Chiri mountain. The images have informedCSW upda te OCTOBER 2011 The Holy Mother of Chiri Mountain aFemale Mountain Spirit in Korea by Maya Stiller UCLA Center

  3. Democratic People's Republic of Korea Initiative Export Control Issues for the Proposed

    E-Print Network [OSTI]

    PNNL-13425 Democratic People's Republic of Korea Initiative Export Control Issues for the Proposed.S. government export control regulations and any licensing application will need to be determined before initial

  4. Son preference and fertility in China, South Korea, and the United States 

    E-Print Network [OSTI]

    Min, Ho Sik

    2009-05-15

    The goal of this dissertation is to contribute in three ways to the literature on son preference and fertility through a comparative perspective. First, I examine the impact of son preference on fertility in China and South Korea compared...

  5. U.S. and South Korea Sign Agreement on FutureGen Project | Department...

    Office of Environmental Management (EM)

    Project June 26, 2006 - 2:34pm Addthis Korea to Participate in World's First Integrated Carbon Sequestration and Hydrogen Production Research Power Plant WASHINGTON, DC - U.S....

  6. Energy Demand and Fuel Supply in Developing Countries Brazil, Korea and the Philippines

    E-Print Network [OSTI]

    Sathaye, Jayant A.

    1984-01-01

    1980. COUNTRY REPORT BRAZIL TRENDS OF ENERGY USE I N BRAZILBRAZIL KOREA PHILIPPINES INTRODUCTION During the 1970s, energyENERGY DEMAND AND FUEL SUPPLY IN DEVELOPING COUNTRIES BRAZIL,

  7. Stability and Nukes: China's Domestic Concerns over North Korea's Nuclear Program

    E-Print Network [OSTI]

    Xu, Jun

    2014-05-31

    While the bilateral friendship between China and North Korea was solidified and endured during the Korean war, Beijing's ties to Pyongyang have weakened considerably during the nuclear crisis on the Korean Peninsula, which emerged in October 2002...

  8. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  9. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  10. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  11. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  12. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  13. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  14. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  15. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  16. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  17. Multicultural Education in the Republic of Korea: How Elementary School Teachers Interpret Multicultural Education and Its Practical Use in Classrooms

    E-Print Network [OSTI]

    Lee, Jee Young

    2013-01-01

    and Gay’s concepts of multicultural education. Althoughinterpret the concept of multicultural education (2011). HeMulticultural education is a new concept in Korea.

  18. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  19. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  20. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  1. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  2. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  3. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  4. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  5. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  6. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  7. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  8. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  9. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  10. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  11. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  12. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  13. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  14. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  15. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  16. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  17. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  18. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  19. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  20. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  1. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  3. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  4. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  5. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  6. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  7. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  8. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  9. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  10. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  11. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  12. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  13. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  14. Pacific Affairs Volume 77, No.3 Fall 2004, 493-516 (Electricity Reform at a Crossroads: Problems in South Korea's Power

    E-Print Network [OSTI]

    Delaware, University of

    Policies of IEA Countries: The Republic of Korea 2002 Review (Paris: IEA, 2002) . #12;Byrne, John, L. Gover

  15. This paper presents the current status of a US-Korea collaborative research on bridge health moni-

    E-Print Network [OSTI]

    Lynch, Jerome P.

    of Integrated System for Smart Evaluation of Load Carry- ing Capacity of Bridges. Technical Report, KoreaABSTRACT This paper presents the current status of a US- Korea collaborative research on bridge-term performance and struc- tural integrity of highway bridges. Emerging sensors and monitoring technologies

  16. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  17. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  18. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  19. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  20. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  1. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  2. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  3. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  4. Boryeong Thermal Power Complex, Boryeong-Si, Chungcheongnam-do Province, South Korea

    SciTech Connect (OSTI)

    Neville, J.D.

    2008-10-15

    From tall skyscrapers and flashing neon signs to Buddhist temples and pagodas, South Korea is a mixture of the new and old Asia. Doing its part to help modernise this country, the Boryeong thermal power complex operates six coal-fired 500-MW units that provide electricity to power South Korea's economic growth. One of the important reasons for this facility's overall success is its operational reliability. An example of this is Boryeong Unit 3's outstanding achievement of 3,000 days of trouble-free operation. The Complex also has a dozen 150 MW combined cycle units burning imported liquefied natural gas for electrical system peaking. 4 photos.

  5. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  6. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  7. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  8. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  11. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  12. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  13. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  14. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  15. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  16. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  17. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  18. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    SciTech Connect (OSTI)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  19. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  20. Limiting the Nuclear Club--Iraq, North Korea, et al. Jonathan I. Katz

    E-Print Network [OSTI]

    Katz, Jonathan I.

    proliferation of nuclear weapons. The first conclusion is that proliferation is easy and inevitable. The secondLimiting the Nuclear Club--Iraq, North Korea, et al. Jonathan I. Katz Washington University, St development of nuclear weapons in 1949. Two plausible conclusions may be drawn from this history of the first

  1. Children's School December 2013 Education Exchange in South Korea (Violet McGillen)

    E-Print Network [OSTI]

    's University's Early Childhood Education Department to share ideas from our laboratory school and learn about of the trip, we visited other early childhood facilities, including the Seoul Early Childhood Education early education in Korea. We found the city of Seoul to be a vibrant, lively city that never stops

  2. Vibrio litoralis sp. nov., isolated from a Yellow Sea tidal flat in Korea

    E-Print Network [OSTI]

    Bae, Jin-Woo

    Vibrio litoralis sp. nov., isolated from a Yellow Sea tidal flat in Korea Young-Do Nam,1,2 Ho-negative, facultatively anaerobic bacterial strains, MANO22DT and MANO22P, were isolated from a tidal flat area of Dae and energy sources. A phylogenetic analysis based on 16S rRNA gene sequences revealed that the strains belong

  3. Transactions of the Korean Nuclear Society Spring Meeting Jeju, Korea, May 17-18, 2012

    E-Print Network [OSTI]

    DE: Development Environment for Safety-Critical Software of Nuclear Power Plant Jong-Hoon Lee , Junbeom Yoo V&V [2], V&V tasks are defined for each development phase. Software in Nuclear Power Plant (NPPTransactions of the Korean Nuclear Society Spring Meeting Jeju, Korea, May 17-18, 2012 Nu

  4. For publication in the Korea Australia J. of Rheology, 2001 KINEMATICS OF FILAMENT STRETCHING IN

    E-Print Network [OSTI]

    For publication in the Korea Australia J. of Rheology, 2001 1 KINEMATICS OF FILAMENT STRETCHING, USA Abstract The development of filament stretching extensional rheometers over the past decade has function. At large strains and high extension rates the extension of fluid filaments in both dilute

  5. Transactions of the Korean Nuclear Society Autumn Meeting Pyeongchang, Korea, October 30-31, 2014

    E-Print Network [OSTI]

    develop software in nuclear power plant systems more dependably [5,6]. FBD (Function Block Diagram), which development of PLC (programmable logic controllers) in nuclear power plants. Software development for criticalTransactions of the Korean Nuclear Society Autumn Meeting Pyeongchang, Korea, October 30-31, 2014

  6. Current MSW Management and Waste-to-Energy Status in the Republic of Korea

    E-Print Network [OSTI]

    Columbia University

    plants, most in metropolitan areas, are supplying energy, mostly in the form of heat. The rest to the nation in the form of district heat and electricity, corresponding to only 0.24% of the total primary energy supply. Since the Republic of Korea is ranked tenth in energy consumption worldwide and over 95

  7. Effect of Flow Pulses on Degradation Downstream of Hapcheon Dam, South Korea

    E-Print Network [OSTI]

    Julien, Pierre Y.

    Effect of Flow Pulses on Degradation Downstream of Hapcheon Dam, South Korea Young Ho Shin1 and Pierre Y. Julien, M.ASCE2 Abstract: The changes in channel geometry downstream of Hapcheon Dam, South sluice gate operations affect the 45-km reach of the Hwang River between the Hapcheon Reregulation Dam

  8. Macromolecular Research, Vol. 23, No. 1, pp 118-123 (2015) The Polymer Society of Korea

    E-Print Network [OSTI]

    Rogers, John A.

    2015-01-01

    to tissue engineering and electronics. Keywords: electrohydrodynamic jet printing, nanofiber patterning on Electrohydrodynamic Jet Printing Chiho Song1 , John A. Rogers2 , Jong-Man Kim*,3,4 , and Heejoon Ahn*,1,4 1 Department of Organic and Nano Engineering, Hanyang University, 17 Haengdang-Dong, Seongdong-Gu, Seoul 133-791, Korea 2

  9. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  10. [Review of] Stefan Michael Newerkla. Sprachkontakte deutsch – tschechisch – slowakisch. Wörterbuch der deutschen Lehnwörter im Tschechischen und Slowakischen: historische Entwicklung, Beleglage, bisherige und neue Deutungen. Zweite, durchgehend überarbeitete und aktualisierte Auflage (= Schriften über Sprachen und Texte 7)

    E-Print Network [OSTI]

    Greenberg, Marc L.

    2013-01-01

    — 112 — Slavia Centralis 1/2013 Ocene, zapiski, poro?ila – Reviews, Notes, Reports SteFan MiCHael neWerkla. SPracHKontaKte deutScH – tScHecHiScH – SLoWaKiScH. Wörterbuch der deutschen Lehnwörter im Tschechischen und Slowakischen: historische... is the second edition of the Dictionary of German Loanwords in Czech and Slovak, which includes also considerable information not only about the German lexical component of these two languages, but of Slavic as a whole, a book that received some sixteen...

  11. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  12. The earth matter effects in neutrino oscillation experiments from Tokai to Kamioka and Korea

    E-Print Network [OSTI]

    Kaoru Hagiwara; Naotoshi Okamura; Ken-ichi Senda

    2011-09-08

    We study the earth matter effects in the Tokai-to-Kamioka-and-Korea experiment (T2KK), which is a proposed extension of the T2K (Tokai-to-Kamioka) neutrino oscillation experiment between J-PARC at Tokai and Super-Kamiokande (SK) in Kamioka, where an additional detector is placed in Korea along the same neutrino beam line.By using recent geophysical measurements, we examine the earth matter effects on the oscillation probabilities at Kamioka and Korea. The average matter density along the Tokai-to-Kamioka baseline is found to be 2.6 g/cm^3, and that for the Tokai-to-Korea baseline is 2.85, 2.98, and 3.05 g/cm^3 for the baseline length of L = 1000, 1100, and 1200 km, respectively. The uncertainty of the average density is about 6%, which is determined by the uncertainty in the correlation between the accurately measured sound velocity and the matter density. The effect of the matter density distribution along the baseline is studied by using the step function approximation and the Fourier analysis. We find that the nu_mu -> nu_e oscillation probability is dictated mainly by the average matter density, with small but non-negligible contribution from the real part of the first Fourier mode. We also find that the sensitivity of the T2KK experiment on the neutrino mass hierarchy does not improve significantly by reducing the matter density error from 6% to 3%, since the measurement is limited by statistics for the minimum scenario of T2KK with SK at Kamioka anda 100 kt detector in Korea considered in this report. The sensitivity of the T2KK experiment on the neutrino mass hierarchy improves significantly by splitting the total beam time into neutrino and anti-neutrino runs, because the matter effect term contributes to the oscillation amplitudes with the opposite sign.

  13. The Regulatory Challenges of Decommissioning Nuclear Power Plants in Korea - 13101

    SciTech Connect (OSTI)

    Lee, Jungjoon; Ahn, Sangmyeon; Choi, Kyungwoo; Kim, Juyoul; Kim, Juyub

    2013-07-01

    As of 2012, 23 units of nuclear power plants are in operation, but there is no experience of permanent shutdown and decommissioning of nuclear power plant in Korea. It is realized that, since late 1990's, improvement of the regulatory framework for decommissioning has been emphasized constantly from the point of view of International Atomic Energy Agency (IAEA)'s safety standards. And it is known that now IAEA prepare the safety requirement on decommissioning of facilities, its title is the Safe Decommissioning of Facilities, General Safety Requirement Part 6. According to the result of IAEA's Integrated Regulatory Review Service (IRRS) mission to Korea in 2011, it was recommended that the regulatory framework for decommissioning should require decommissioning plans for nuclear installations to be constructed and operated and these plans should be updated periodically. In addition, after the Fukushima nuclear disaster in Japan in March of 2011, preparedness for early decommissioning caused by an unexpected severe accident became also important issues and concerns. In this respect, it is acknowledged that the regulatory framework for decommissioning of nuclear facilities in Korea need to be improved. First of all, we identify the current status and relevant issues of regulatory framework for decommissioning of nuclear power plants compared to the IAEA's safety standards in order to achieve our goal. And then the plan is to be established for improvement of regulatory framework for decommissioning of nuclear power plants in Korea. After dealing with it, it is expected that the revised regulatory framework for decommissioning could enhance the safety regime on the decommissioning of nuclear power plants in Korea in light of international standards. (authors)

  14. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  15. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  16. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  17. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  18. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  19. Summary of the 3rd International Workshop on a Far Detector in Korea for the J-PARC Beam

    E-Print Network [OSTI]

    T. Kajita; S. B. Kim; A. Rubbia

    2008-08-05

    The 3rd International Workshop on a Far Detector in Korea for the J-PARC Neutrino Beam was held at the Hongo Campus of Tokyo University, Tokyo, Japan on Sep. 30th and October 1, 2007. Forty seven physicists from Japan and Korea, as well as Europe and USA, participated in the workshop and discussed the physics opportunities offered by the J-PARC conventional neutrino beam detected by a new large underground neutrino detector in Korea. In this paper, we highlight some of the most relevant findings of the workshop.

  20. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  1. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  2. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  3. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  4. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  5. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  6. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  7. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  8. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  9. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  10. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  11. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  12. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  13. DEUTSCHE BIOGRAPHIE HERAUSGEGEBEN VON DER

    E-Print Network [OSTI]

    Pukelsheim, Friedrich

    ; Epistolae de dissidiis religionis, J. Sadoleti, J. Omphalii, J. Sturmii, 1539; In partitiones oratorias; Academicae episto- lae urbanae, 1569; Educationis puerilis linguae, II partes, 1571; De imitatione oratoria

  14. Deutsche Forschungsgemeinschaft Priority Program 1253

    E-Print Network [OSTI]

    Hinze, Michael

    Klaus Deckelnick , Andreas G¨unther & Michael Hinze Abstract: We consider an elliptic optimal control. Mathematics Subject Classification (2000): 49J20, 49K20, 35B37 Keywords: Elliptic optimal control problem optimization, cooling processes frequently are described by systems of partial differential equations involving

  15. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  16. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  17. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  18. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  19. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  20. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  1. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  2. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  3. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  4. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  5. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  6. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  7. The strategic transformation of advertising agencies in the digital era : the case of Cheil Worldwide in Korea

    E-Print Network [OSTI]

    Yang, Hye Sung (Hye Sung Hazel)

    2015-01-01

    Cheil Worldwide is the number one marketing and advertising agency in Korea. Throughout its history, it heavily relied on its parent company and major client, Samsung and on traditional media advertising for its revenue. ...

  8. The politics of consensus-building : case study of diesel vehicles and urban air pollution in South Korea

    E-Print Network [OSTI]

    Kim, Dong-Young, Ph. D. Massachusetts Institute of Technology

    2006-01-01

    Look at the three efforts to resolve public disputes over diesel passenger cars and urban air quality management in South Korea. this dissertation explores the main obstacles in nascent democracies to meeting the necessary ...

  9. International Media Coverage of North Korea: A Study of Journalists and News Reports on the Six-party Nuclear Talks

    E-Print Network [OSTI]

    Seo, Hyunjin

    2009-01-01

    This study examines what factors influence journalists’ perceived importance of different attributes of North Korea. In particular, this study analyzes the degree to which journalists’ perceived credibility of their ...

  10. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  11. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  12. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  13. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  14. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  15. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  16. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  17. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  18. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  19. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  20. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  1. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  2. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  3. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  4. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  5. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  6. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  7. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  8. Existence challenged, progress envisioned, culture compromised: the effects of western influences on traditional values in South Korea 

    E-Print Network [OSTI]

    Min, Crystal Dawn

    2006-08-16

    CHALLENGED, PROGRESS ENVISIONED, CULTURE COMPROMISED: THE EFFECTS OF WESTERN INFLUENCES ON TRADITIONAL VALUES IN SOUTH KOREA A Thesis by CRYSTAL DAWN MIN Submitted to the Office of Graduate Studies of Texas A&M University... ON TRADITIONAL VALUES IN SOUTH KOREA A Thesis by CRYSTAL DAWN MIN Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved by...

  9. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  10. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  11. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  12. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  13. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  14. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  15. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  16. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  17. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  18. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  19. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  20. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  1. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  2. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  3. Republic of Korea Reduction of Financing Barriers for Energy Savings Performance Contracts

    SciTech Connect (OSTI)

    Howard, D. L.

    2005-11-01

    This paper discusses the findings developed for strengthening the role of performance contracting in improving energy efficiency in the Republic of Korea. The U.S. Environmental Protection Agency (EPA) sponsored development of this paper by the National Renewable Energy Laboratory (NREL), as a part of the Korean-U.S. Climate Technology Partnerships (CTP) program. The results and recommendations outlined in this paper together with other efforts are designed to assist other countries striving to improve their efficient use of energy.

  4. South Korea-Economics of Climate Change and Low Carbon Growth Strategies in

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-Enhancing Capacity forSiliciumEnergyHouston, Texas: Energy ResourcesKensington,Korea

  5. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  6. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  7. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  8. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  9. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  10. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  11. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  12. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  13. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  14. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  15. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  16. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  17. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  18. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  19. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  20. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  1. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  2. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  3. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  4. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  5. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  7. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  8. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12

  9. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNRELNuclear Security

  10. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOE Office of99SavingTrilateralUnionSecurity

  11. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel MagnetizationTransportationVideos HomePower HomeSecurity

  12. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  13. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  14. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  15. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. taiwan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    taiwan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  18. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  19. Cyber Security | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant,...

  20. hrp | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    hrp | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  1. sliderphotos | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  2. Trident | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Trident | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  3. Nike | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nike | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  4. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  5. PIA - WEB Physical Security Major Application | Department of...

    Energy Savers [EERE]

    PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PDF icon PIA - WEB Physical Security Major...

  6. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  7. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  8. The National Security Policy Process: The National Security Council and Interagency System

    E-Print Network [OSTI]

    Huang, Wei

    The National Security Policy Process: The National Security Council and Interagency System By Alan Update: August 15, 2011 #12;THIS PAGE INTENTIONALLY BLANK 2 #12;Table of Contents The National Security Policy Process: The National Security Council and Interagency System

  9. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    » Cybercrime and cyberterrorism » Information technology of little use without security 3 #12;GEORGGEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2

  10. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  11. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  12. Computer Security Division 2009 Annual Report

    E-Print Network [OSTI]

    Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

  13. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y. (Rochester, MN)

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  14. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    stretching from energy-rich Sakhalin in the Northeast,Korea, while that from Sakhalin could be shipped by pipelinefor access to the Sakhalin Island or Spratly Island oil

  15. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01

    system engineer. A tool is developed to support the steps supporting this methodology and help to bridge the smart metering domain. Copyright © 2013 John Wiley & Sons, Ltd. KEYWORDS model-based engineering; security engineering; security ontology; domain-specific modelling; embedded systems; smart metering

  16. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vendor has issued a fix: 1. Cisco Secure ACS version 5.1: File 5-1-0-44-6.tar.gpg - ACS 5.1.0.44 cumulative patch 6 2. Cisco Secure ACS version 5.2: File...

  17. PRACTICAL SECURITY Implementing Security Education at a Small Community College

    E-Print Network [OSTI]

    Whatcom Community College Abstract: This paper discusses modifying an existing two-year degree to include, and introducing an information security specialty into an existing degree can be challenging. At Whatcom Community ASSURANCE CURRICULUM At the beginning of the 2003-2004 academic year, Whatcom had one security course

  18. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  19. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  1. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  2. Risk-driven Security Testing versus Test-driven Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    Risk-driven Security Testing versus Test-driven Security Risk Analysis Gencer Erdogan1 the combinations of se- curity testing and security risk analysis depending on whether it is viewed from a security testing perspective or a security risk analysis perspective. The main focus in the former view is security

  3. GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl MIT Laboratory give a simple proof that GM-security and semantic security are equivalent security no- tions for public security definitions which are still the mostly used ones today. The two notions are called `GM

  4. EU asks Korean support in locating fusion project The European Union wants Korea's support in its bid to locate the ITER, or

    E-Print Network [OSTI]

    from nine standpoints, including earthquakes, transportation, science technology and the environment and technology with Oh Myung, minister for science and technology. "I saw the high potential of Korea's science and technology. But this potential is unknown to many European countries. Korea should speak out about

  5. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  6. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  7. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  8. Trusted Cloud: Microsoft Azure Security, Privacy,

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance April 2015 #12;Trusted Cloud................................................................. 18 #12;Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance | April, 2015 Introduction: Microsoft Azure Security, Privacy, and Compliance | April, 2015 #12;3 Contents Introduction

  9. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01

    plants as a form of energy security in the absence of suffi-can be drawn. The energy security situation and outlook areregional cooperation on energy and security issues in Asia.

  10. POLICYProfessional Perspectives on Energy Security, Economics,

    E-Print Network [OSTI]

    TheGoalsof ENERGY POLICYProfessional Perspectives on Energy Security, Economics Security, Economics, and the Environment The Goals of Energy Policy: Professional Perspectives on Energy Security, Economics, and the Environment EXECUTIVE SUMMARY Energy-related incidents and issues ­ the BP

  11. Security Design and Information Aggregation in Markets

    E-Print Network [OSTI]

    Chen, Yiling

    Security Design and Information Aggregation in Markets Yiling Chen Anthony M. Kwasnica Abstract that information aggregation ability of markets is affected by the security design. Behavior of individual Keywords: Security design; Information aggregation; Information market; Price convergence. 1 Introduction

  12. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of electric grid security under terrorist threat’,and a guideline to smart grid security in NIST-IR 7628. Al-the current security posture of the power grid, (2) develop

  13. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    myths and facts behind cyber security risks for industrialJ. and Hieb, J. [2007], ‘Cyber security risk assessment forOn Cyber Security for Networked Control Systems by Saurabh

  14. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    is directed to develop cyber security standards, guidelines, and associated methods and techniques. ITLNISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew

  15. Departmental Personnel Security- Policy and Procedures

    Broader source: Energy.gov [DOE]

    Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

  16. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    Radack, Editor Computer Security Division Information Technology Laboratory National Institute-35, Guide to Information Technology Security Ser vices, Recommendations of the National InstituteJune 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley

  17. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  18. Water Scarcity, Security and democracy

    E-Print Network [OSTI]

    Water Scarcity, Security and democracy: a Mediterranean Mosaic edited by Francesca de châtel, Gail holst-WarhaFt and taMMo steenhuis #12;#12;Water Scarcity, Security and democracy: a mediterranean moSaic #12;© 2014 by Global Water Partnership Mediterranean, Cornell University and the Atkinson Center

  19. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  20. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  1. Distributed Internet Security and Measurement

    E-Print Network [OSTI]

    New Mexico, University of

    , New Mexico May, 2009 #12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science for the Degree of Doctor of Philosophy Computer Science The University of New Mexico Albuquerque, New Mexico May

  2. Having difficulty with Chinese? - the rise of the vernacular book in Japan, Korea and Vietnam

    E-Print Network [OSTI]

    Kornicki, Peter

    2009-04-14

    of the eighth century, therefore, I am talking of the kingdom of Silla which occupied the Korean peninsula, of Parhae to the north of it, and of China, Japan and Annam, which occupied the northern part of what is now Vietnam; if we leap ahead... to the nineteenth century then I am talking of China itself, of unified Korea, of Japan, of the Ry?ky? kingdom (which is now called Okinawa and is part of Japan), of a much enlarged Vietnam, and of Manchuria, the north- eastern part of China. For the sake...

  3. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  5. (No) Security in Automation!?

    E-Print Network [OSTI]

    Lüders, S

    2008-01-01

    Modern Information Technologies like Ethernet, TCP/IP, web server or FTP are nowadays increas-ingly used in distributed control and automation systems. Thus, information from the factory floor is now directly available at the management level (From Shop-Floor to Top-Floor) and can be ma-nipulated from there. Despite the benefits coming with this (r)evolution, new vulnerabilities are in-herited, too: worms and viruses spread within seconds via Ethernet and attackers are becoming interested in control systems. Unfortunately, control systems lack the standard security features that usual office PCs have. This contribution will elaborate on these problems, discuss the vulnerabilities of modern control systems and present international initiatives for mitigation.

  6. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01

    impacts and responses to environmental change making it anhuman security or environmental change if the lecturer isReview: Global Environmental Change and Human Security By

  7. Developing Secure Power Systems Professional Competence: Alignment...

    Energy Savers [EERE]

    Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems...

  8. Transportation Safeguards & Security Test Bed (TSSTB) | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Safeguards and Security Test Bed May 30, 2013 The Transportation Safeguards and Security Test Bed consists of a test-bed vehicle and a monitoringlaboratorytraining...

  9. Control Systems Security Standards: Accomplishments And Impacts...

    Broader source: Energy.gov (indexed) [DOE]

    that need to be made toward meeting the priority strategies defined in the DOEDHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards:...

  10. Energy Security Planning for Sustainable Buildings | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    capabilities are sufficient to serve their most critical needs during a prolonged outage. Energy Security Assessments For analysis and planning, see Performing Energy Security...

  11. Lemnos Interoperable Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Program began with one logical concept: If vendors develop control systems security products using an agreed-upon set of capability and operational requirements,...

  12. Recommended Security Controls for Federal Information Systems...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines (Derived From Appendix F) Minimum Requirements: FedRamp Security Controls...

  13. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Office of Environmental Management (EM)

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  14. Nuclear Security Conference 2010 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his...

  15. 2014 Headquarters Facilities Master Security Plan- Acronyms

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Acronyms A list of the acronyms contained in the 2014 Headquarters Facilities Master Security Plan (HQFMSP).

  16. Harold Washington Social Security Administration (SSA) Center...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  17. Nevada National Security Site Waste Acceptance Criteria

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Waste Acceptance Criteria Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office Environmental...

  18. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  19. Enforcement Letter, National Security Technologies, LLC - November...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    November 13, 2007 Enforcement Letter, National Security Technologies, LLC - November 13, 2007 November 13, 2007 Issued to National Security Technologies, LLC related to an...

  20. Consent Order, Lawrence Livermore National National Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lawrence Livermore National National Security, LLC - WCO-2010-01 Consent Order, Lawrence Livermore National National Security, LLC - WCO-2010-01 October 29, 2010 Issued to Lawrence...

  1. Voluntary Protection Program Onsite Review, National Security...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - February 2015 Voluntary Protection Program Onsite Review, National Security Technologies, LLC - February 2015 February 2015 Recertification of...

  2. Independent Activity Report, Nevada National Security Site -...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    December 2012 Independent Activity Report, Nevada National Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR...

  3. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security Enforcement Preliminary Notice of Violation...

  4. Voluntary Protection Program Onsite Review, National Security...

    Energy Savers [EERE]

    January 2009 Voluntary Protection Program Onsite Review, National Security Technologies, LLC - January 2009 January 2009 Evaluation to determine whether the National Security...

  5. National Nuclear Security Administration | Department of Energy

    Office of Environmental Management (EM)

    Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction Initiative U.S. Global Threat...

  6. Homeland Security and Emergency Management Coordination (HSEMC...

    National Nuclear Security Administration (NNSA)

    Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  7. National Nuclear Security Administration Appropriation and Program...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

  8. National Nuclear Security Administration Fact Sheet Preliminary...

    Energy Savers [EERE]

    Worker Safety and Health Violations at Nevada National Security Site On August 25, 2015, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of...

  9. Control Systems Security Publications Library | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Metrics for Process Control Systems - September 2007 Security Framework for Control System Data Classification and Protection - July 2007 Secure ICCP Integration...

  10. Office of Global Material Security | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  11. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    is caused due to an error within the delay feature and can be exploited to consume all web server instances via multiple failed login attempts. IMPACT: Drupal Login Security...

  12. Y-12 National Security Complex | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a...

  13. Automatic intrusion recovery with system-wide history B.S., Korea Advanced Institute of Science and Technology (2009)

    E-Print Network [OSTI]

    2009-01-01

    Automatic intrusion recovery with system-wide history by Taesoo Kim B.S., Korea Advanced Institute of Science and Technology (2009) S.M., Massachusetts Institute of Technology (2011) Submitted for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2014 c Massachusetts

  14. Earth Planets Space, 60, 453461, 2008 InSAR-based mapping of surface subsidence in Mokpo City, Korea, using

    E-Print Network [OSTI]

    Amelung, Falk

    Earth Planets Space, 60, 453­461, 2008 InSAR-based mapping of surface subsidence in Mokpo City land in Korea. This reclaimed land is currently experiencing significant ground subsidence due to soil consolidation. We have estimated the subsidence rate of Mokpo City (8 × 8 km) using the synthetic aperture radar

  15. EECE 401: International Summer Experience in Energy, Environmental & Chemical Engineering June 1-June 12, 2009 / Seoul, Korea

    E-Print Network [OSTI]

    Subramanian, Venkat

    for Pattern Integration and 2. Solar Cell 2. Building Energy Nano/Bio Cluster in Yonsei Univ., BT/IT FAB [Prof) Korea Institute of Machinery & Materials (KIMM) Lab tour and Activities Tue 7A. 1. Energy & Env by Geothermal Energy 9C. Solar cell, aerosol, HVAC & Two-Phase Flow [Prof. Sam Yoon] [Prof. Jong-Wook Suh

  16. 1 2010 International Conference of the System Dynamics Society Seoul, Korea Greening the Economy with New Markets

    E-Print Network [OSTI]

    Ford, Andrew

    1 2010 International Conference of the System Dynamics Society Seoul, Korea Greening the Economy with New Markets: System Dynamics Simulations of Energy and Environmental Markets Proceedings of the 28th to newly created markets dealing with energy and the environment. The examples include markets

  17. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  18. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  19. Meeting Federal Energy Security Requirements

    Office of Energy Efficiency and Renewable Energy (EERE)

    Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

  20. Forrestal Security and Safety Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1983-02-02

    To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

  1. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  2. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  3. INL@Work Cyber Security

    SciTech Connect (OSTI)

    Chaffin, May

    2010-01-01

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  4. INL@Work Cyber Security

    ScienceCinema (OSTI)

    Chaffin, May

    2013-05-28

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  5. Java Programming MSc. Internet Security

    E-Print Network [OSTI]

    Hill, Gary

    Java Programming MSc. Internet Security - 1 - Table of content Introduction Appendices............................................................................. 70 #12;Java and accompanying application using Java 3D coding. The developed application, in a Java 3D environment, will form

  6. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threatand the Threat of Climate Change,” The CNA Corporation, 2007

  7. Homeland Security Issues for Facilities 

    E-Print Network [OSTI]

    McClure, J. D.; Fisher, D.; Fenter, T.

    2004-01-01

    The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become...

  8. Master Safeguards and Security Agreements

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03

    To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

  9. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

  10. Security Area Vouching and Piggybacking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-05

    Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

  11. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  12. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  13. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful financial institutions or e-commerce organizations. On December 6, SEAS' Information Security Office held some basic security awareness information. More information on how to remain secure during the busy

  14. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  15. COMPUTER SECURITY EDUCATION Past, Present and Future

    E-Print Network [OSTI]

    information. Computer security researchers and practitioners were few in number, worked primarilyCOMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden: This paper presents an overview of computer security education in academia. We examine security education

  16. 7: Network Security Comp 361, Fall 2003

    E-Print Network [OSTI]

    Golin, Mordecai J.

    "securely" Trudy (intruder) may intercept, delete, add messages secure sender secure receiver channel Alice, Alice be? ... well, real-life Bobs and Alices! Web browser/server for electronic transactions (e updates other examples? #12;7: Network Security 6 Comp 361, Fall 2003 There are bad guys (and girls) out

  17. A Graphical Approach to Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    A Graphical Approach to Security Risk Analysis Doctoral Dissertation by Ida Hogganvik Submitted to security risk analysis i Acknowledgements First of all, I would like to thank my supervisor Ketil Střlen to security risk analysis #12;A graphical approach to security risk analysis iii List of Original Publications

  18. Internet Security Protocols Lectures 7 and 8

    E-Print Network [OSTI]

    Sandhu, Ravi

    operate in Ř transport mode · end-to-end Ř tunnel mode · security-gateway to security-gateway v transport Network 2 Internal Network 1 Security Gateway Security Gateway 8© Ravi Sandhu 2001 IP TUNNELING Source mode and tunnel model can coexist #12;7© Ravi Sandhu 2001 IP TUNNELING C A B D Public Internet Internal

  19. Internet Security Protocols Lectures 7 and 8

    E-Print Network [OSTI]

    Sandhu, Ravi

    PROTOCOLS both IP AH and IP ESP can operate in transport mode · end-to-end tunnel mode · security-gateway to security-gateway transport mode and tunnel model can coexist #12;7© Ravi Sandhu 2000-2004 IP TUNNELING C A B D Public Internet Internal Network 2 Internal Network 1 Security Gateway Security Gateway 8© Ravi

  20. Are We Compromised? Modelling Security Assessment Games

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    against cyber-attacks. A security assessment is the process of determining how effectively an entity being examples of cyber attacks that fit this profile are the security breach at RSA Data Security [6Are We Compromised? Modelling Security Assessment Games Viet Pham and Carlos Cid Information

  1. Cyber Security Research: A Personal Perspective

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed It will be messy but need not be chaotic! Cyber security research and practice are loosing ground © Ravi Sandhu 2 with Real-World Impact! Cyber Security Scope #12; What is fundamental to cyber security? Where

  2. Cyber Security Basic Defenses and Attack Trends

    E-Print Network [OSTI]

    Sastry, S. Shankar

    37 38 39 40 41 4273 MTC 4 Cyber Security Basic Defenses and Attack Trends Alvaro A. Cárdenas, Tanya for a successful defense. Cyber security is the branch of security dealing with digital or information technology.1 This chapter presents a selected overview on topics in cyber security. 1. Throughout the chapter, we use

  3. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    played an active role in implementation planning for the Comprehensive National Cyber Security InitiativeComputer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act

  4. INSTITUTE FOR CYBER SECURITY Purpose-Centric

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security (ICS) University of Texas at San Antonio September 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Butler

  5. NISTIR 7621 Small Business Information Security

    E-Print Network [OSTI]

    . .......................................8 3.3 Security concerns about popup windows and other hacker tricks

  6. Towards Collaborative Robots for Infrastructure Security Applications

    E-Print Network [OSTI]

    Guo, Yi

    , infrastructure security and monitoring of sensitive national security sites (e.g. nuclear facilities, powerTowards Collaborative Robots for Infrastructure Security Applications Yi Guo School of Electrical.madhavan@nist.gov Abstract-- We discuss techniques towards using collaborative robots for infrastructure security

  7. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  8. Motivation to study security of control systems. Our Results/Contribution. Summary. Security constrained control under

    E-Print Network [OSTI]

    Hu, Fei

    Motivation to study security of control systems. Our Results/Contribution. Summary. Security Secure control systems UC Berkeley #12;Motivation to study security of control systems. Our Results/Contribution. Summary. Outline. Motivation to study security of control systems. Distributed control systems

  9. On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud ABSTRACT Secure data intensive computing in the cloud is challenging, in- volving a complicated tradeoff among security owners will not be likely to use public clouds to process their sensitive data. Secure computation

  10. Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?

    E-Print Network [OSTI]

    Qin, Xiao

    Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

  11. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University networks and data products. But as technology becomes more complex, security threats also become more

  12. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  13. Why the Gulf War still matters: Foreign perspectives on the war and the future of international security. Report No. 16

    SciTech Connect (OSTI)

    Garrity, P.J.

    1993-07-01

    This report summarizes the main findings of a Center for National Security Studies (CNSS) project that examined how a number of nations other than the United States have reacted to the course and outcome of the Persian Gulf War of 1991. The project was built around studies of key countries on which the Gulf War might reasonably be expected to have had a significant impact: Argentina, the ASEAN states, Brazil, China, Cuba, Egypt, France, Germany, India, Iran, Iraq, Israel, Italy, Japan, Jordan, Libya, North Korea, Russia, Saudi Arabia, South Korea, Spain, Syria, Taiwan, the United Kingdom, Vietnam, and the states of the former Yugoslavia. These country studies were written by well-recognized independent experts following a common set of guidelines provided by CNSS. When the country studies were completed, they were reviewed and supplemented through a series of peer assessments and workshops. The report represents a synthesis of material generated through this process, and is intended to stimulate thought and further analysis on the critical topics discussed herein.

  14. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability 

    E-Print Network [OSTI]

    Ragsdale, G.

    2010-01-01

    Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17th Symposium... for Improving Building Systems in Hot and Humid Climates Austin Texas August 24-25, 2010 Southwest Research Institute 1947 J. Dan Bates 2009 ? 60+ years, founded 1947 ? 3200+ employees ? 4000+ R&D projects/yr. ? $500M revenue ? 1200 acres ? 170 buildings...

  15. Recent Experience of and Prospects for High-Speed Rail in Korea: Implications of a Transport System and Regional Development from a Global Perspective

    E-Print Network [OSTI]

    Shin, Dong-Chun

    2005-01-01

    of and Prospects for High-Speed Rail in Korea: Implications6 I.3. High-Speed RailCountries Operating High-Speed Rail .. 22 VI. Impact on

  16. The City as a national growth machine : city-building and the role of urban development in South Korea's political and economic transitions

    E-Print Network [OSTI]

    Joo, Yu Min

    2011-01-01

    This dissertation bridges the fields of international development and urban studies to examine South Korea's city building and urban development processes, arguing that the interaction between urban and industrial policies ...

  17. Stress, Coping, and Psychological Well-Being: Comparison among American and Asian International Graduate Students from Taiwan, China, and South Korea

    E-Print Network [OSTI]

    Yang, Ya-Ting Tina

    2010-07-16

    The purpose of this study was to examine the relationships of stress, coping, and psychological well-being among American graduate students and Asian international graduate students from Taiwan, China, and Korea. The sample consisted of 131 American...

  18. Information Security Policy Manual Latest Revision: May 16, 2012

    E-Print Network [OSTI]

    Alpay, S. Pamir

    1 Information Security Policy Manual Latest Revision: May 16, 2012 #12;2 Table of Contents Information Security Policy Manual...............................................................................................................................................17 Information Security Glossary

  19. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

  20. Information Aggregation, Currency Swaps, and the Design of Derivative Securities

    E-Print Network [OSTI]

    Chowdhry, Bhagwan; Grinblatt, Mark

    1997-01-01

    their disparate information and (ii) each security should befor these securities and the information it generates.all information relevant for pricing securities to all

  1. Sandia Energy - The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Center for SCADA Security Assets Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure...

  2. Energy and Security in Northeast Asia: Proposals for Nuclear Cooperation

    E-Print Network [OSTI]

    Kaneko, Kumao; Suzuki, Atsuyuki; Choi, Jor-Shan; Fei, Edward

    1998-01-01

    Asia, examine the energy- security connection in Asia withon the long-term security of energy supply, which mustin East Asia's security, nuclear energy, and environment. It

  3. Towards the Secure Initialisation of a Personal Distributed Environment

    E-Print Network [OSTI]

    Tomlinson, Allan

    protection from in- truders. Moreover, traditional computer networks employ security gateways secure tunnels. In a VPN, a level of security corresponding to traditional networks is achieved through

  4. Security Implications of Typical Grid Computing Usage Scenarios

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.

    2001-01-01

    issues and challenges The Grid security requirements that wea seri- ous challenge to Grid security measures. Grids thatbased on using available Grid security services. Both Globus

  5. Summit on Education in Secure Software Final Report

    E-Print Network [OSTI]

    Burley, Diana L.; Bishop, Matt

    2011-01-01

    designed to meet the cyber security challenges of theobjectives: 1. To have cyber security stakeholders fromWashington University Cyber Security Policy and Research

  6. Before the House Subcommittee on Emerging Threats, Cyber Security...

    Office of Environmental Management (EM)

    Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

  7. Roadmap to Secure Control Systems in the Energy Sector - January...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy Sector - January 2006 Roadmap to Secure Control Systems in the Energy Sector - January 2006 This document, the Roadmap to Secure...

  8. SOVEREIGN WEALTH FUNDS AND NATIONAL SECURITY: THE GREAT TRADEOFF

    E-Print Network [OSTI]

    COHEN, BENJAMIN J

    2009-01-01

    ends represents a major national security issue. ’ 33 EchoedWEALTH FUNDS AND NATIONAL SECURITY: THE GREAT TRADEOFFthe legitimate national security concerns of individual host

  9. Independent Activity Report, Los Alamos National Security - June...

    Office of Environmental Management (EM)

    Los Alamos National Security - June 2011 Independent Activity Report, Los Alamos National Security - June 2011 June 2011 Review of the Los Alamos National Security Emergency...

  10. Homeland Security and Defense Applications

    ScienceCinema (OSTI)

    None

    2015-01-09

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  11. Ultrabroadband Quantum-Secured Communication

    E-Print Network [OSTI]

    Quntao Zhuang; Zheshen Zhang; Justin Dove; Franco N. C. Wong; Jeffrey H. Shapiro

    2015-08-06

    We propose a two-way secure-communication protocol in which Alice uses an amplified spontaneous emission source while Bob employs binary phase-shift keying and an optical amplifier. Against an eavesdropper who captures all the light lost in fibers linking Alice and Bob, this protocol is capable of 3.5 Gbps quantum-secured direct communication at 50 km range. If Alice augments her terminal with a spontaneous parametric downconverter and both Alice and Bob add channel monitors, they can realize 2 Gbps quantum key distribution at that range against an eavesdropper who injects her own light into Bob's terminal. Compared with prevailing quantum key distribution methods, this protocol has the potential to significantly increase secure key rates at long distances by employing many ultrabroadband photons per key bit to mitigate channel loss.

  12. Homeland Security and Defense Applications

    SciTech Connect (OSTI)

    None

    2014-11-06

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  13. Security-by-design handbook.

    SciTech Connect (OSTI)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji; Ochiai, Kazuya; Iida, Toru

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  14. Climate Change and National Security

    SciTech Connect (OSTI)

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  15. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National Nuclear Security

  16. GAP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  17. Physical Security 1.CyberCIEGE Physical Security

    E-Print Network [OSTI]

    .2.4 Establish Physical Security to Protect TOP SECRET Assets · The game will automatically pause when Jerry begins work on TOP SECRET assets · Check your objectives and go to the ASSETS screen, select "Intel Summary" and then click on the TOP SECRET label to learn what kind of protection is needed by this asset

  18. A Declarative Framework for Security: Secure Concurrent Constraint Programming

    E-Print Network [OSTI]

    Valencia, Frank D.

    Javeriana Cali {halopez,japerez,crueda}@cic.puj.edu.co 2 INRIA and LIX École Polytechnique catuscia in the analysis of security protocols and one promising approach is the development of formalisms that model and implementations for CCP have been developed: E.g., denotational models [SRP91], specification logics and proof

  19. Security on Campus The Security Office and lost

    E-Print Network [OSTI]

    Teaching building (building 104). · Call 9553 7333 (24 hour hotline). Security call buttons are located are located in the Gym. Contact the Student Centre for access. Travel Smart Maps · Travel Smart maps or top up Smart Riders from the Rockingham train station or most newsagents. Maps and timetables

  20. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  1. OFFICE of the CHIEF INFORMATION SECURITY OFFICER

    E-Print Network [OSTI]

    Matrajt, Graciela

    security and privacy. Services are designed to help UW units understand risks by analyzing and forecasting Chief Information Security Officer In reflecting back on all our hard work during 2012, I would like of Contents Asset-Based Risk Management

  2. Statistical analysis of correlated fossil fuel securities

    E-Print Network [OSTI]

    Li, Derek Z

    2011-01-01

    Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

  3. Validating Cyber Security Requirements: A Case Study

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  4. Risk Based Security Management at Research Reactors

    SciTech Connect (OSTI)

    Ek, David R.

    2015-09-01

    This presentation provides a background of what led to the international emphasis on nuclear security and describes how nuclear security is effectively implemented so as to preserve the societal benefits of nuclear and radioactive materials.

  5. Investigating Database Security in a Networked Environment

    E-Print Network [OSTI]

    Wagner, Paul J.

    Investigating Database Security in a Networked Environment Matthew Giuliani Computer Science wagnerpj@uwec.edu Abstract Database and network security have traditionally been separate fields within flowing between client and database systems. Although vender specific information is available for many

  6. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-06

    This Notice extends DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, dated 3-18-02, until 7-6-05.

  7. The Technical Specification for the Security Content

    E-Print Network [OSTI]

    Security Agency (NSA); Jeff Ito, Matt Kerr, Shane Shaffer, and Greg Witte of G2, Inc.; Andy Bove of Secure Thompson of Booz Allen Hamilton; Alan Peltzman of the Defense Information Systems Agency (DISA); and Jon

  8. NFC SECURITY ON ANDROID DEVICES MATTHEW QUINLAN

    E-Print Network [OSTI]

    ElAarag, Hala

    NFC SECURITY ON ANDROID DEVICES by MATTHEW QUINLAN Advisor DR. ELAARAG A senior research [proposal .................................................................................................. 13 4. NFC SECURITY ON ANDROID DEVICES ...................................................... 15 4............................................................................................ 20 5. FUZZING ANDROID'S NFC STACK................................................................ 23

  9. Specifying and Checking Unix Security Constraints

    E-Print Network [OSTI]

    Tygar, Doug

    Padula 2 . In their model, each user and le is assigned a linear security level e.g., top secret, secret, not secret; roughly speaking, it is only acceptable for users to write les at their security level or higher

  10. An Operations Research approach to aviation security

    E-Print Network [OSTI]

    Martonosi, Susan Elizabeth

    2005-01-01

    Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

  11. Information Security Specialist | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security Specialist Information Security Specialist Submitted by admin on Sun, 2015-09-13 00:15 Job Summary Organization Name Department Of Energy Agency SubElement...

  12. Investigation of relativistic runaway electrons in electron cyclotron resonance heating discharges on Korea Superconducting Tokamak Advanced Research

    SciTech Connect (OSTI)

    Kang, C. S.; Lee, S. G.

    2014-07-15

    The behavior of relativistic runaway electrons during Electron Cyclotron Resonance Heating (ECRH) discharges is investigated in the Korea Superconducting Tokamak Advanced Research device. The effect of the ECRH on the runaway electron population is discussed. Observations on the generation of superthermal electrons during ECRH will be reported, which will be shown to be consistent with existing theory for the development of a superthermal electron avalanche during ECRH [A. Lazaros, Phys. Plasmas 8, 1263 (2001)].

  13. The Secure Hash Payment System 

    E-Print Network [OSTI]

    Thompson, Timothy J

    2001-01-01

    to be developed. Today, consumers are required to provide their complete credit card information to a merchant to complete a transaction, which requires trust in the merchant and the merchant's security. While this approach is widely available and used, it does...

  14. Security & Sustainability College of Charleston

    E-Print Network [OSTI]

    Young, Paul Thomas

    Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

  15. IPM packages deliver food security

    E-Print Network [OSTI]

    Isaacs, Rufus

    IPM packages deliver food security For the past 5 years IPM CRSP researchers have been developing Package for potato production in Kyrgyzstan Central Asia Integrated Pest Management Collaborative Research, Walter Pett, and David Douches, Michigan State University. An IPM package is a set of practices

  16. IPM packages deliver food security

    E-Print Network [OSTI]

    Isaacs, Rufus

    IPM packages deliver food security For the past 5 years IPM CRSP researchers have been developing Package for open field tomato production in Uzbekistan Central Asia Integrated Pest Management. An IPM package is a set of practices and technologies that can be used in production to increase yield

  17. IPM packages deliver food security

    E-Print Network [OSTI]

    Isaacs, Rufus

    IPM packages deliver food security For the past 5 years IPM CRSP researchers have been developing Package for wheat production in Tajikistan Central Asia Integrated Pest Management Collaborative Research State University; Dr. Anvar Jalilov, Tajik Academy of Agricultural Sciences, Tajikistan. An IPM package

  18. Secure Symmetrical Multilevel Diversity Coding 

    E-Print Network [OSTI]

    Li, Shuo

    2012-07-16

    Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

  19. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn Secondary applications: usage-based car insurance usage-based road tax congestion charging speed, in the hands of someone (thief, electronic prisoner, road-tax avoider) who wants it to report a pretended

  20. Information Security Office Risk Management

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Information Security Office Risk Management Exception Template #12;Risk Management Exception or Approved) 6/01/2013 CISO Jason Pufahl, CISO Approved 6/01/2013 RMAC Risk Management Advisory Council Reviewed #12;Risk Management Exception Template 2 | P a g e Please check one of the following: Requester