Powered by Deep Web Technologies
Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

2

Report Period: EIA ID NUMBER: Instructions: (e.g., Street Address, Bldg, Floor, Suite)  

U.S. Energy Information Administration (EIA) Indexed Site

Report Period: Report Period: EIA ID NUMBER: Instructions: (e.g., Street Address, Bldg, Floor, Suite) Secure File Transfer option available at: (e.g., PO Box, RR) Electronic Transmission: The PC Electronic Data Reporting Option (PEDRO) is available. Zip Code: - If interested in software, call (202) 586-9659. Email form to: Fax form to: (202) 586-9772 - - Mail form to: Oil & Gas Survey - - U.S. Department of Energy Ben Franklin Station PO Box 279 Washington, DC 20044-0279 Questions? Call toll free: 1-800-638-8812 OOG.SURVEYS@eia.doe.gov Contact Name: Version No.: 2013.01 Date of this Report: Mo Day State: Year Phone No.: DOMESTIC CRUDE OIL FIRST PURCHASE REPORT Company Name: A completed form must be filed by the 30th calendar day following the end of the report

3

Enhancing NASA Cyber Security Awareness From the C-Suite ...  

Science Conference Proceedings (OSTI)

... Leadership concerns with IT security impacts ? Cyber Security Summit Full day of workshops / panel sessions on transformation of IT / IT security ...

2013-03-28T23:59:59.000Z

4

APS Floor Coordinators  

NLE Websites -- All DOE Office Websites (Extended Search)

to: cee@aps.anl.gov SecurityPrivacy Notice APS Floor Coordinators LOM COORDINATORS CAT INFORMATION 431 A,B,D Vacant SRI-CAT, Sectors 1-3 C FC Office E SRI-CAT, Sector 4 432 A...

5

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

6

LANL Go Suite  

NLE Websites -- All DOE Office Websites (Extended Search)

LANL Go Suite LANL Go Suite LANL Go Suite The LANL Go Suite is a collection of packages, libraries, utilities, and software patches related to Google's Go programming language (http://www.golang.org/). September 24, 2013 software Available for thumbnail of Feynman Center (505) 665-9090 Email LANL Go Suite The LANL Go Suite is a collection of packages, libraries, utilities, and software patches related to Google's Go programming language (http://www.golang.org/). The LANL Go Suite largely takes a high-performance computing angle to Go by providing some of the mechanisms needed to use Go in a supercomputing environment. For instance, the LANL Go Suite provides a Go interface to PAPI, the University of Tennessee at Knoxville's Performance Application Programming Interface (http://icl.cs.utk.edu/papi/), which helps software developers identify

7

STAYS PNNL SUITE  

Energy Science and Technology Software Center (OSTI)

002851IBMPC00 STAYSL PNNL Suite http://radiochemscieng.pnnl.gov/research_areas/research_area_description.asp?id=283

8

BESTEST Test Suites  

NLE Websites -- All DOE Office Websites (Extended Search)

BESTEST Test Suites BESTEST (Building Energy Simulation TEST) is a method for testing, diagnosing, and validating the capabilities of building energy simulation programs. The...

9

Directed Test Suite Augmentation.  

E-Print Network (OSTI)

??Test suite augmentation techniques are used in regression testing to identify code elements affected by changes and to generate test cases to cover those elements. (more)

Xu, Zhihong

2013-01-01T23:59:59.000Z

10

Small Business Cyber Security Workshop for Portland, Oregon ...  

Science Conference Proceedings (OSTI)

Page 1. Portland District Office Small Business Cyber Security Workshop Portland District Office 601 SW Second Ave. Suite ...

2013-07-24T23:59:59.000Z

11

Sheraton Seattle Hotel Floor Plans  

Science Conference Proceedings (OSTI)

139th Annual Meeting & Exhibition. Sheraton Seattle Hotel Floor Plans. MEETING ROOMS. RESTROOMS. LEVEL 1. LEVEL. MEETING INFORMATION.

12

Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic System  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Suite of Projects Suite of Projects RTU Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic System Michael Brambley, Ph.D. Pacific Northwest National Laboratory Michael.Brambley@pnnl.gov (509) 375-6875 April 4, 2013 2 | Building Technologies Office eere.energy.gov * Packaged air conditioners and heat pumps (RTUs) are used in about 58% of all cooled commercial buildings, serving about 69% of the cooled commercial building floor space (EIA 2003) - Navigant estimates that packaged air conditioners

13

Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic System  

NLE Websites -- All DOE Office Websites (Extended Search)

Suite of Projects Suite of Projects RTU Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic System Michael Brambley, Ph.D. Pacific Northwest National Laboratory Michael.Brambley@pnnl.gov (509) 375-6875 April 4, 2013 2 | Building Technologies Office eere.energy.gov * Packaged air conditioners and heat pumps (RTUs) are used in about 58% of all cooled commercial buildings, serving about 69% of the cooled commercial building floor space (EIA 2003) - Navigant estimates that packaged air conditioners

14

WOOD FLOORING 1. INTRODUCTION TO WARM AND WOOD FLOORING  

E-Print Network (OSTI)

This chapter describes the methodology used in EPAs Waste Reduction Model (WARM) to estimate streamlined life-cycle greenhouse gas (GHG) emission factors for wood flooring beginning at the waste generation reference point. 1 The WARM GHG emission factors are used to compare the net emissions associated with wood flooring in the following three waste management alternatives: source reduction, combustion, and landfilling.

unknown authors

2012-01-01T23:59:59.000Z

15

Control of human induced floor vibrations  

E-Print Network (OSTI)

With the growing demand for open, column-free floor spaces and the advances in material strength, floor vibration serviceability criterion has been of growing importance within the past 20-30 years. All floor systems are ...

Homen, Sean Manuel

2007-01-01T23:59:59.000Z

16

BRC-CBEFF Conformance Test Suite  

Science Conference Proceedings (OSTI)

... technical interfaces), and the development of associated conformance testing architectures and testing suites designed to test for conformance to ...

2013-08-01T23:59:59.000Z

17

Impact of Thermally Insulated Floors  

E-Print Network (OSTI)

Presently in Kuwait the code of practice for energy conservation in the air conditioned buildings implemented by the Ministry of Electricity and Water (MEW) which has been in effect since 1983 has no consideration taken for thermally insulating the floors of residential and commercial buildings with unconditioned basements. As a part of a comprehensive research program conducted by the Building and Energy Technologies Department of Kuwait Institute for Scientific Research for revision of the code this paper analyzes the effect of using un-insulated floors on the peak cooling demand and energy consumption of a middle income residential private villa and a onebedroom multi-story apartment building in Kuwait. These floors typically separate air-conditioned spaces with ambient environment or un-conditioned spaces. This was done using the ESP-r, a building's energy simulation program, in conjunction with typical meteorological year for Kuwait. The study compared such typical floors with three types of insulated floors. It was found that using an R- 10 floors in multi-story apartment buildings greatly reduce both the peak cooling demand as well as the energy consumption by about 15%, whereas only minimal savings (about 4%) were detected in the case of the residential villas.

Alghimlas, F.; Omar, E. A.

2004-01-01T23:59:59.000Z

18

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

19

WinSEND: Windows SEcure Neighbor Discovery  

Science Conference Proceedings (OSTI)

Neighbor Discovery Protocol (NDP) is an essential protocol in IPv6 suite, but it is known to be vulnerable to critical attacks. Thus, SEcure Neighbor Discovery (SEND) is proposed to counter NDP security threats. Unfortunately, operating systems lack ... Keywords: cryptographically generated addresses (cga), ipv6 security and protection, neighbor discovery protocol (ndp), send implementation

Hosnieh Rafiee; Ahmad Alsa'deh; Christoph Meinel

2011-11-01T23:59:59.000Z

20

News from the Expo floor  

Science Conference Proceedings (OSTI)

Sustainability, the recession, and challenges to the biodiesel industry were three major topics raised by a number of exhibitors at the 101st AOCS Annual Meeting & Expo in Phoenix, Arizona, USA, May 1619, 2010. News from the Expo floor Inform Magazine I

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Building Energy Software Tools Directory: EEM Suite  

NLE Websites -- All DOE Office Websites (Extended Search)

EEM Suite EEM Suite EEM Suite Logo Enables large companies to proactively monitor, analyze and manage energy costs and consumption. EEM Suite combines analysis and reporting tools; real-time, event-driven alerts; and Web-based enterprise visibility into a single solution so users can control their energy costs and usage. EEM Suite leverages meter, billing, production, real-time price, rate and weather information to drive significant energy and water reductions. Users can control utility costs through timely identification of billing errors and overcharges, drive accountability through accurate cost allocation and tenant rebilling, monitor performance against budgets, predict energy requirements to assist in key operational activities planning, improve operational efficiency through continuous facility and

22

NBTC Safety Orientation Second Floor Duffield Hall  

E-Print Network (OSTI)

­ EVACUATE THE BUILDING. IF THERE IS A GAS ALARM ­ EVACUATE THE FLOOR. IF THE GAS ALARM IS ON ALL FLOORS&S) - Laser Safety - Centrifuge Rotor Safety - Fire Extinguisher Education · ENTER THE LABS BY SWIPING YOUR ID

Wu, Mingming

23

Sheraton Seattle Hotel Floor Plans - TMS  

Science Conference Proceedings (OSTI)

LEARN NETWORK ADVANCE. Sheraton Seattle Hotel Floor Plans. MEETING ROOMS. RESTROOMS. LEVEL. PIKE ST. TOWER. UNION ST. TOWER.

24

From Shop Floor to Top Floor: Best Business Practices in Energy Efficiency  

Open Energy Info (EERE)

From Shop Floor to Top Floor: Best Business Practices in Energy Efficiency From Shop Floor to Top Floor: Best Business Practices in Energy Efficiency Jump to: navigation, search Tool Summary LAUNCH TOOL Name: From Shop Floor to Top Floor: Best Business Practices in Energy Efficiency Agency/Company /Organization: Pew Center on Global Climate Change Sector: Energy Focus Area: Energy Efficiency Topics: Policies/deployment programs Resource Type: Lessons learned/best practices Website: www.pewclimate.org/docUploads/PEW_EnergyEfficiency_FullReport.pdf References: From Shop Floor to Top Floor: Best Business Practices in Energy Efficiency[1] FROM SHOP FLOOR TO TOP FLOOR: BEST BUSINESS PRACTICES IN ENERGY EFFICIENCY. Pew Center on Global Climate Change. William R. Prindle. April 2010. In the last decade, rising and volatile energy prices coupled with

25

Securing Public Space [Awards Jury Commentaries  

E-Print Network (OSTI)

suited to the EDRA/Places awards. Yetexcept for one entry,absent from this years awards cycle. Those who design,Vale / Securing Public Space Awards Jury Commentaries Places

Vale, Lawrence J

2005-01-01T23:59:59.000Z

26

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

27

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

28

Wireless networking security: open issues in trust, management, interoperation and measurement  

Science Conference Proceedings (OSTI)

The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve security mechanisms. The design, development and evaluation of security techniques ... Keywords: interoperation, management, measurement, network security, open security, trust, wireless networks, wireless security

Joseph B. Evans; Weichao Wang; Benjamin J. Ewy

2006-09-01T23:59:59.000Z

29

Introduction to the HPC Challenge Benchmark Suite  

Science Conference Proceedings (OSTI)

The HPC Challenge benchmark suite has been released by the DARPA HPCS program to help define the performance boundaries of future Petascale computing systems. HPC Challenge is a suite of tests that examine the performance of HPC architectures using kernels with memory access patterns more challenging than those of the High Performance Linpack (HPL) benchmark used in the Top500 list. Thus, the suite is designed to augment the Top500 list, providing benchmarks that bound the performance of many real applications as a function of memory access characteristics e.g., spatial and temporal locality, and providing a framework for including additional tests. In particular, the suite is composed of several well known computational kernels (STREAM, HPL, matrix multiply--DGEMM, parallel matrix transpose--PTRANS, FFT, RandomAccess, and bandwidth/latency tests--b{sub eff}) that attempt to span high and low spatial and temporal locality space. By design, the HPC Challenge tests are scalable with the size of data sets being a function of the largest HPL matrix for the tested system.

Luszczek, Piotr; Dongarra, Jack J.; Koester, David; Rabenseifner,Rolf; Lucas, Bob; Kepner, Jeremy; McCalpin, John; Bailey, David; Takahashi, Daisuke

2005-04-25T23:59:59.000Z

30

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

31

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

32

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

33

SHARP: Reactor Performance and Safety Simulation Suite  

NLE Websites -- All DOE Office Websites (Extended Search)

SHARP SHARP Argonne National Laboratory's Reactor Performance and Safety Simulation Suite SHARP could save millions in nuclear reactor design and development... The Simulation-based High-efficiency Advanced Reactor Prototyping (SHARP) suite of codes enables virtual design and engineering of nuclear plant behavior that would be impractical from a traditional experimental approach. ...by leveraging the computational power of one of the world's most powerful supercomputers. Exploiting the power of Argonne Leadership Computing Facility's near-petascale computers, researchers have developed a set of simulation tools that provide a highly detailed description of the reactor core and the nuclear plant behavior. This enables the efficient and precise design of tomorrow's safe and clean nuclear energy sources.

34

In Outer Space without a Space Suit?  

E-Print Network (OSTI)

The author proposes and investigates his old idea - a living human in space without the encumbrance of a complex space suit. Only in this condition can biological humanity seriously attempt to colonize space because all planets of Solar system (except the Earth) do not have suitable atmospheres. Aside from the issue of temperature, a suitable partial pressure of oxygen is lacking. In this case the main problem is how to satiate human blood with oxygen and delete carbonic acid gas (carbon dioxide). The proposed system would enable a person to function in outer space without a space suit and, for a long time, without food. That is useful also in the Earth for sustaining working men in an otherwise deadly atmosphere laden with lethal particulates (in case of nuclear, chemical or biological war), in underground confined spaces without fresh air, under water or a top high mountains above a height that can sustain respiration.

Alexander Bolonkin

2008-06-24T23:59:59.000Z

35

T-599: Microsoft April 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

99: Microsoft April 2011 Security Bulletin Release 99: Microsoft April 2011 Security Bulletin Release T-599: Microsoft April 2011 Security Bulletin Release April 11, 2011 - 5:24am Addthis PROBLEM: Microsoft April 2011 Security Bulletin Release PLATFORM: Microsoft Windows, Microsoft Office, Microsoft Server Software, and Microsoft Developer Tools and Software ABSTRACT: Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. reference LINKS: Microsoft Security Bulletin Advance Notification for April 2011 Microsoft Security April Affected Software TechNet Webcast: Information About Microsoft April Security Bulletins IMPACT ASSESSMENT: High Discussion:

36

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

37

The bioenergetics of walking and running in space suits  

E-Print Network (OSTI)

Space-suited activity is critical for human spaceflight, and is synonymous with human planetary exploration. Space suits impose kinematic and kinetic boundary conditions that affect movement and locomotion, and in doing ...

Carr, Christopher E. (Christopher Edward), 1976-

2005-01-01T23:59:59.000Z

38

Notices Disabled, 1401 S. Clark Street, Suite  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

13 Federal Register 13 Federal Register / Vol. 78, No. 240 / Friday, December 13, 2013 / Notices Disabled, 1401 S. Clark Street, Suite 10800, Arlington, Virginia 22202-4149. FOR FURTHER INFORMATION CONTACT: Barry S. Lineback, Telephone: (703) 603-7740, Fax: (703) 603-0655, or email CMTEFedReg@AbilityOne.gov. SUPPLEMENTARY INFORMATION: Addition On 6/28/2013 (78 FR 38952-38953), the Committee for Purchase From People Who Are Blind or Severely Disabled published notice of proposed addition to the Procurement List. After consideration of the material presented to it concerning capability of qualified nonprofit agency to provide the service and impact of the addition on the current or most recent contractors, the Committee has determined that the service listed below is suitable for procurement by the

39

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

40

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Comparing non-adequate test suites using coverage criteria  

Science Conference Proceedings (OSTI)

A fundamental question in software testing research is how to compare test suites, often as a means for comparing test-generation techniques. Researchers frequently compare test suites by measuring their coverage. A coverage criterion C provides a set ... Keywords: Coverage criteria, non-adequate test suites

Milos Gligoric, Alex Groce, Chaoqiang Zhang, Rohan Sharma, Mohammad Amin Alipour, Darko Marinov

2013-07-01T23:59:59.000Z

42

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

43

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

44

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

45

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

46

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

47

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

48

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

49

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

50

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

51

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

52

A Test Suite Generator For Struts Based Applications.  

E-Print Network (OSTI)

??Testing web-based enterprise applications requires the use of automated testing frameworks. The testing framework's ability to run suites of test cases through development ensures enhancements (more)

Jackson, Gregory M.

2004-01-01T23:59:59.000Z

53

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

54

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

55

Kalman-type positioning filters with floor plan information  

Science Conference Proceedings (OSTI)

A family of Kalman-type filters that estimate the user's position indoors, using range measurements and floor plan data, is presented. The floor plan information is formulated as a set of linear constraints and is used to truncate the Gaussian posterior ... Keywords: Kalman filter, floor plan, inequality constraints, nonlinear filtering, positioning

Tommi Perl; Simo Ali-Lytty

2008-11-01T23:59:59.000Z

56

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

57

Floor Support | Stanford Synchrotron Radiation Lightsource  

NLE Websites -- All DOE Office Websites (Extended Search)

Floor Support Floor Support Service Responsible Person BLDG Extension (650) 926-XXXX Beam Status Duty Operator 120 926-2326 (BEAM) Duty Operator Cell Duty Operator 120 926-4040 Scheduling X-ray/VUV Macromolecular Crystallography Cathy Knotts Lisa Dunn 120 120 3191 2087 User Check-In/Badging Jackie Kerlegan 120 2079 User Financial Accounts Jackie Kerlegan 120 2079 Beam Lines/ VUV Bart Johnson 120 3858 Beam Lines/ X-ray Bart Johnson 120 3858 Beam Lines/ X-ray Mechanical Chuck Troxel, Jr. 120 2700 Beam Lines/ X-ray-VUV Electronics Alex Garachtchenko 120 3440 Beam Lines/ Macromolecular Crystallography Mike Soltis 277 3050 SMB XAS Beam Lines & Equipment Matthew Latimer Erik Nelson 274 274 4944 3938 MEIS XAS Beam Lines & Equipment Matthew Latimer

58

Science and Global Security, 17:119, 2009 Copyright C Taylor & Francis Group, LLC  

E-Print Network (OSTI)

Laboratory, Wendell C. DeMarcus of the University of Kentucky, Carl Eckart of the University of California of U.S. Programs R. Scott Kemp Program on Science & Global Security, Princeton University, Princeton on Science & Global Security, 221 Nassan St., 2nd Floor, Princeton University, Princeton, NJ 08542, USA. E

Chen, Sow-Hsin

59

User ESH Support (UES)/Floor Coordinators  

NLE Websites -- All DOE Office Websites (Extended Search)

User ESH Support (UES) / Floor Coordinators User ESH Support (UES) / Floor Coordinators Bruce Glagola, Group Leader Building 431, Room Z005 Phone: 630-252-9797 Fax: 630-252-1664 E-mail: glagola@aps.anl.gov Nena Moonier Building 431, Room Z008 Phone: 630-252-8504 Fax: 630-252-1664 E-mail: nmoonier@aps.anl.gov Karen Kucer Building 401, Room C3257C Phone: 630-252-9091 Fax: 630-252-5948 E-mail: kucer@aps.anl.gov Floor Coordinators Bruno Fieramosca Building 432, Room C001 Phone: 630-252-0201 Fax: 630-252-1664 On-site page: 4-0201 E-mail: bgf@aps.anl.gov Shane Flood Building 436, Room C001 Phone: 630-252-0600 Fax: 630-252-1664 On-site pager: 4-0600 E-mail: saf@aps.anl.gov Patti Pedergnana Building 434, Room C001 Phone: 630-252-0401 Fax: 630-252-1664 On-site pager: 4-0401 E-mail: neitzke@aps.anl.gov Wendy VanWingeren Building 435, Room C001

60

On test suite composition and cost-effective regression testing  

E-Print Network (OSTI)

Regression testing is an expensive testing process used to re-validate software as it evolves. Various methodologies for improving regression testing processes have been explored, but the cost-effectiveness of these methodologies has been shown to vary with characteristics of regression test suites. One such characteristic involves the way in which test inputs are composed into test cases within a test suite. This article reports the results of controlled experiments examining the effects of two factors in test suite composition test suite granularity and test input grouping on the costs and benefits of several regression-testing-related methodologies: retest-all, regression test selection, test suite reduction, and test case prioritization. These experiments consider the application of several specific techniques, from each of these methodologies, across ten releases each of two substantial software systems, using seven levels of test suite granularity and two types of test input grouping. The effects of granularity, technique, and grouping on the cost and fault-detection effectiveness of regression testing under the given methodologies are analyzed. This analysis shows that test suite granularity significantly affects several cost-benefit factors for the methodologies considered, while test input grouping has limited effects. Further, the results expose essential tradeoffs affecting the relationship between test suite design and regression testing cost-effectiveness, with several implications for practice. 1

Gregg Rothermel; Sebastian Elbaum; Alexey Malishevsky; Praveen Kallakuri

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

The Security Epidemic  

NLE Websites -- All DOE Office Websites (Extended Search)

5-1130 5-1130 A different version of this appeared in Security Management 50, pp. 88-94 (2006). Turnkey Turnover Solutions: Powerful Tools and Experts are Available! Eddie G. Bitzer III, M.A. and Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Los Alamos National Laboratory Introduction It's early in World War II, and the US is scrambling to put together an effective fighting force. But how to you select and place millions of former civilians into military positions that will suit their abilities and temperament? The Army turned to industrial/organizational (I/O) psychologists. To solve this problem, the I/O psychologists developed the Army General Classification Test (AGCT), which later evolved into the Armed Services Vocational Aptitude Battery (ASVAB) still used

62

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

63

T-645: Microsoft Security Bulletin Advance Notification | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification 5: Microsoft Security Bulletin Advance Notification T-645: Microsoft Security Bulletin Advance Notification June 13, 2011 - 3:45pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on June 14, 2011. PLATFORM: Windows Operating System and Components, Microsoft Office Suites and Software, Microsoft Server Software, Microsoft Developer Tools and Software and Microsoft Security Software ABSTRACT: Microsoft provides the Microsoft Security Bulletin Advance Notification Service. This advance notification is intended to help our customers plan for effective deployment of security updates, and includes information about the number of new security updates being released, the software affected, severity levels of vulnerabilities, and information about any

64

Method and apparatus for recovering a gas from a gas hydrate located on the ocean floor  

DOE Patents (OSTI)

A method and apparatus for recovering a gas from a gas hydrate on the ocean floor includes a flexible cover, a plurality of steerable base members secured to the cover, and a steerable mining module. A suitable source for inflating the cover over the gas hydrate deposit is provided. The mining module, positioned on the gas hydrate deposit, is preferably connected to the cover by a control cable. A gas retrieval conduit or hose extends upwardly from the cover to be connected to a support ship on the ocean surface.

Wyatt, Douglas E. (Aiken, SC)

2001-01-01T23:59:59.000Z

65

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

66

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

67

Improving the effectiveness of test suite reduction for user-session-based testing of web applications  

Science Conference Proceedings (OSTI)

Context: Test suite reduction is the problem of creating and executing a set of test cases that are smaller in size but equivalent in effectiveness to an original test suite. However, reduced suites can still be large and executing all the tests in a ... Keywords: Ordering reduced suites, Test suite prioritization, Test suite reduction, User-session-based testing, Web application testing

Sreedevi Sampath; Rene C. Bryce

2012-07-01T23:59:59.000Z

68

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

69

Natural Gas Price Uncertainty: Establishing Price Floors  

Science Conference Proceedings (OSTI)

This report presents the results of comprehensive calculations of ceiling and floor prices for natural gas. Ceiling prices are set by the price levels at which it is more economic to switch from natural gas to residual fuel oil in steam units and to distillate in combined cycle units. Switching to distillate is very rare, whereas switching to fuel oil is quite common, varying between winter and summer and increasing when natural gas prices are high or oil prices low. Monthly fuel use was examined for 89 ...

2007-01-11T23:59:59.000Z

70

PREVENTIVE CONSERVATION: A CONCEPT SUITED TO THE CONSERVATION OF EARTHEN  

E-Print Network (OSTI)

PREVENTIVE CONSERVATION: A CONCEPT SUITED TO THE CONSERVATION OF EARTHEN ARCHITECTURAL HERITAGE and Construction Key words: Preventive conservation, traditional conservation practices, risk reduction, heritage management Abstract The concept of "preventive conservation" is relatively old as it has already been

Recanati, Catherine

71

Building Energy Software Tools Directory: SunAngle Professional Suite  

NLE Websites -- All DOE Office Websites (Extended Search)

SunAngle Professional Suite SunAngle Professional Suite SunAngle Professional logo. More sophisticated, robust, and well-documented version of SunAngle for people interested in better understanding the calculation methodology or developing their own solar angle calculation tools. The Professional Suite includes well-documented HTML/JavaScript and Microsoft Excel versions of SunAngle, plus a detailed technical manual explaining how to perform all of the underlying calculations. Screen Shots Keywords sun angle, solar calculator Validation/Testing Outputs of the SunAngle Professional Suite were compared to published standard sources of solar angle data; this is documented in the SunAngle Technical Manual. Expertise Required Knowledge of HTML, JavaScript, and/or Microsoft Excel, if the user wishes

72

The Extreme Benchmark Suite : measuring high-performance embedded systems  

E-Print Network (OSTI)

The Extreme Benchmark Suite (XBS) is designed to support performance measurement of highly parallel "extreme" processors, many of which are designed to replace custom hardware implementations. XBS is designed to avoid many ...

Gerding, Steven (Steven Bradley)

2005-01-01T23:59:59.000Z

73

AEDG Implementation Recommendations: Floors | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Floors Floors The Advanced Energy Design Guide (AEDG) for Small Office Buildings, 30% series, seeks to achieve 30% savings over ASHRAE Standard 90.1-1999. This guide focuses on improvements to small office buildings, less than 20,000ft2. The recommendations in this article are adapted from the implementation section of the guide and focus on mass floors; steel joist or wood frame floors; slab-on-grade floors. Publication Date: Wednesday, May 13, 2009 air_floors.pdf Document Details Affiliation: DOE BECP Focus: Compliance Building Type: Commercial Code Referenced: ASHRAE Standard 90.1-1999 Document type: AEDG Implementation Recommendations Target Audience: Architect/Designer Builder Contractor Engineer State: All States Contacts Web Site Policies U.S. Department of Energy

74

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

75

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

76

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

77

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

78

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

79

Novel millimeter wave sensor concepts for energy, environment, and national security  

E-Print Network (OSTI)

Millimeter waves are ideally suited for sensing and diagnosing materials, devices, and processes that are broadly important to energy, environment, and national security. Thermal return reflection (TRR) techniques that ...

Sundaram, S. K.

80

V.: Security considerations in space and delay tolerant networks  

E-Print Network (OSTI)

This paper reviews the Internet-inspired security work on delay tolerant networking, in particular, as it might apply to space missions, and identifies some challenges arising, for both the Internet security community and for space missions. These challenges include the development of key management schemes suited for space missions as well as a characterization of the actual security requirements applying. A specific goal of this paper is therefore to elicit feedback from space mission IT specialists in order to guide the development of security mechanisms for delay tolerant networking. 1.

Stephen Farrell; Vinny Cahill

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

82

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

83

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

84

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

85

Energy Saving in Office Building by Floor Integration System...  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Saving in Office Building by Floor Integration System: Reducing Total Energy of HVAC and Lighting system using daylight Speaker(s): Yoshifumi Murakami Date: May 20, 2004 -...

86

Property:Building/FloorAreaChurchesChapels | Open Energy Information  

Open Energy Info (EERE)

Churches and chapels Retrieved from "http:en.openei.orgwindex.php?titleProperty:BuildingFloorAreaChurchesChapels&oldid285978" What links here Related changes Special pages...

87

Property:Building/FloorAreaGroceryShops | Open Energy Information  

Open Energy Info (EERE)

for Grocery shops Retrieved from "http:en.openei.orgwindex.php?titleProperty:BuildingFloorAreaGroceryShops&oldid286018" What links here Related changes Special pages...

88

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Test Suite for Random and Pseudorandom Number Generators for Cryptographic ... Nov 1985, Guide on Selecting ADP Backup Process Alternatives *. ...

89

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

90

Extender for securing a closure  

DOE Patents (OSTI)

An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

Thomas, II, Patrick A.

2012-10-02T23:59:59.000Z

91

sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu  

E-Print Network (OSTI)

useless. Thus we assume that control centers are trusted in our protocol. 4 sSCADA protocol suite The sSCADA which are not acceptable to SCADA protocols. Semantic security property [17] is used to ensure.g., at off-peak time). A simple counter synchronization protocol is proposed for the sSCADA protocol suite

92

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

93

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

94

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

95

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

96

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

97

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

98

OMB No. 1905-0165 Expiration Date: 12/31/2011 Version No.:2009.01 ...  

U.S. Energy Information Administration (EIA)

Physical Address (e.g., Street Address, Building Number, Floor, Suite): Secure File Transfer: ... Kerosene & light gas oils 830 Heavy Gas Oils 840 Residuum 850

99

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

100

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

102

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

103

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

104

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

105

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

106

Building Energy Software Tools Directory: Right-Suite Residential for  

NLE Websites -- All DOE Office Websites (Extended Search)

Right-Suite Residential for Windows Right-Suite Residential for Windows Right-Suite Residential for Windows logo. All-in-one HVAC software performs residential loads calculations, duct sizing, energy analysis, equipment selection, cost comparison calculations, and geothermal loop design. Also allows you to design your own custom proposals. Used for system design, for sales representation, and for quotation preparations. Buy only what you need. Unused functions are shipped as demos, so the program can grow with your needs. Keywords residential loads calculations, duct sizing, energy analysis, HVAC equipment selection, system design Validation/Testing N/A Expertise Required Knowledge of general HVAC concepts. High level of computer literacy not required. Users Over 10,000 users of Right-J loads.

107

Selecting The Optimal Logging Suite For Geothermal Reservoir Evaluation-  

Open Energy Info (EERE)

Selecting The Optimal Logging Suite For Geothermal Reservoir Evaluation- Selecting The Optimal Logging Suite For Geothermal Reservoir Evaluation- Results From The Alum 25-29 Well, Nevada Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Conference Paper: Selecting The Optimal Logging Suite For Geothermal Reservoir Evaluation- Results From The Alum 25-29 Well, Nevada Details Activities (6) Areas (1) Regions (0) Abstract: This paper presents the results of analysis of a state of the art set of wireline petrophysical and wellbore image logs recorded in the Alum 25-29 well, southwestern Nevada. The Alum well penetrated nearly 2000 ft (610 m) of volcano-clastic rocks and more than 1000 ft of basement, separated from the sediments by a shallowly dipping detachment fault. The logs were acquired both to characterize the site and also to select the

108

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

109

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

110

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

111

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

112

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

113

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

114

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

115

Impact of Solar Heat Gain on Radiant Floor Cooling System Design  

E-Print Network (OSTI)

Bauman F. 2013. Impact of Solar Heat Gain on Radiant FloorBauman F. 2013. Impact of Solar Heat Gain on Radiant FloorBauman F. 2013. Impact of Solar Heat Gain on Radiant Floor

Feng, Jingjuan Dove; Schiavon, Stefano; Bauman, Fred

2013-01-01T23:59:59.000Z

116

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

117

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

118

A Test Suite for GCMs: An Intercomparison of 11  

E-Print Network (OSTI)

A Test Suite for GCMs: An Intercomparison of 11 Dynamical Cores Christiane Jablonowski1, PeterSandia National Laboratories PDEs on the Sphere Workshop, Santa Fe Apr/28/2009 #12;Motivation · Test standardized & easy-to-use analysis techniques · Idea: Establish a collection of test cases that finds broad

Jablonowski, Christiane

119

DYNA3D/ParaDyn Regression Test Suite Inventory  

Science Conference Proceedings (OSTI)

The following table constitutes an initial assessment of feature coverage across the regression test suite used for DYNA3D and ParaDyn. It documents the regression test suite at the time of production release 10.1 in September 2010. The columns of the table represent groupings of functionalities, e.g., material models. Each problem in the test suite is represented by a row in the table. All features exercised by the problem are denoted by a check mark in the corresponding column. The definition of ''feature'' has not been subdivided to its smallest unit of user input, e.g., algorithmic parameters specific to a particular type of contact surface. This represents a judgment to provide code developers and users a reasonable impression of feature coverage without expanding the width of the table by several multiples. All regression testing is run in parallel, typically with eight processors. Many are strictly regression tests acting as a check that the codes continue to produce adequately repeatable results as development unfolds, compilers change and platforms are replaced. A subset of the tests represents true verification problems that have been checked against analytical or other benchmark solutions. Users are welcomed to submit documented problems for inclusion in the test suite, especially if they are heavily exercising, and dependent upon, features that are currently underrepresented.

Lin, J I

2011-01-25T23:59:59.000Z

120

Polysemy and sense proximity in the Senseval-2 test suite  

Science Conference Proceedings (OSTI)

We report on an empirical study of sense relations in the Senseval-2 test suite. We apply and extend the method described in (Resnik and Yarowsky, 1999), estimating proximity of sense pairs from the evidence collected from native-speaker translations ...

Irina Chugur; Julio Gonzalo; Felisa Verdejo

2002-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

T-584: Microsoft March 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Microsoft March 2011 Security Bulletin Release 84: Microsoft March 2011 Security Bulletin Release T-584: Microsoft March 2011 Security Bulletin Release March 21, 2011 - 4:25pm Addthis PROBLEM: Microsoft March 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms.(Affected Software and Download Locations) ABSTRACT: Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: Microsoft Security Bulletin Summary for March 2011 Microsoft Technical Security Notifications

122

T-553: Microsoft February 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Microsoft February 2011 Security Bulletin Release 53: Microsoft February 2011 Security Bulletin Release T-553: Microsoft February 2011 Security Bulletin Release February 9, 2011 - 7:28am Addthis PROBLEM: Microsoft February 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms. (Affected Software and Download Locations) ABSTRACT: Microsoft released 21 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference links: Microsoft Security Bulletin Summary for February 2011 Microsoft Technical Security Notifications

123

T-665: Microsoft Security Bulletin Advance Notification for July 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for July 5: Microsoft Security Bulletin Advance Notification for July 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 July 11, 2011 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2011 PLATFORM: Windows Operating System and Components ABSTRACT: Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: TechNet Webcast Microsoft Security Bulletin Summaries and Webcasts Microsoft Security Bulletin Advance Notification for July 2011

124

13 Railroad Square, Suite 504 Haverhill, Massachusetts 01832  

E-Print Network (OSTI)

for Smart Customer Interface ­ Distribution Automation ­ Smart metering improves load models and profiles Power Grid and Energy Infrastructure? ­ A secure "architected" sensing, communications, automation Automation "Prices to Devices" (Demand Response) Phasor Measurement Smart Grid ­ Exchanging Information

125

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

126

IPv6 stateless address autoconfiguration: balancing between security, privacy and usability  

Science Conference Proceedings (OSTI)

Included in the IPv6 suite is a method for devices to automatically configure their own addresses in a secure manner. This technique is called Cryptographically Generated Addresses (CGAs). CGA provides the ownership proof necessary for an IPv6 address ... Keywords: IPv6 address autoconfiguration, IPv6 security, users' privacy

Ahmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel

2012-10-01T23:59:59.000Z

127

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

128

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

129

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

130

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

131

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

132

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

133

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

134

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

135

The Extreme Benchmark Suite: Measuring High-Performance Embedded Systems  

E-Print Network (OSTI)

The Extreme Benchmark Suite (XBS) is designed to support performance measurement of highly parallel extreme processors, many of which are designed to replace custom hardware implementations. XBS is designed to avoid many of the problems that occur when using existing benchmark suites with nonstandard and experimental architectures. In particular, XBS is intended to provide a fair comparison of a wide range of architectures, from general-purpose processors to hard-wired ASIC implementations. XBS has a clean modular structure to reduce porting effort, and is designed to be usable with slow cycle-accurate simulators. This work presents the motivation for the creation of XBS and describes in detail the XBS framework. Several benchmarks implemented with this framework are discussed, and these benchmarks are used to compare a standard platform, an experimental architecture, and custom

Steven Gerding; Krste Asanovi?

2005-01-01T23:59:59.000Z

136

Property:Building/FloorAreaRestaurants | Open Energy Information  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Building/FloorAreaRestaurants Jump to: navigation, search This is a property of type Number. Floor area for Restaurants Pages using the property "Building/FloorAreaRestaurants" Showing 13 pages using this property. S Sweden Building 05K0007 + 1,990 + Sweden Building 05K0008 + 300 + Sweden Building 05K0013 + 215 + Sweden Building 05K0038 + 345 + Sweden Building 05K0046 + 200 + Sweden Building 05K0058 + 330 + Sweden Building 05K0060 + 256 + Sweden Building 05K0065 + 520 + Sweden Building 05K0081 + 98 + Sweden Building 05K0089 + 155 + Sweden Building 05K0098 + 170 + Sweden Building 05K0105 + 2,450 + Sweden Building 05K0114 + 400 + Retrieved from "http://en.openei.org/w/index.php?title=Property:Building/FloorAreaRestaurants&oldid=285973#SMWResults"

137

Property:Building/FloorAreaMiscellaneous | Open Energy Information  

Open Energy Info (EERE)

FloorAreaMiscellaneous FloorAreaMiscellaneous Jump to: navigation, search This is a property of type Number. Floor area for Miscellaneous Pages using the property "Building/FloorAreaMiscellaneous" Showing 25 pages using this property. S Sweden Building 05K0002 + 360 + Sweden Building 05K0005 + 110 + Sweden Building 05K0013 + 3,550 + Sweden Building 05K0016 + 445 + Sweden Building 05K0021 + 250 + Sweden Building 05K0025 + 254 + Sweden Building 05K0035 + 1,629 + Sweden Building 05K0037 + 175 + Sweden Building 05K0040 + 869 + Sweden Building 05K0044 + 1,234 + Sweden Building 05K0047 + 1,039 + Sweden Building 05K0051 + 1,489.92 + Sweden Building 05K0052 + 200 + Sweden Building 05K0062 + 140 + Sweden Building 05K0063 + 654 + Sweden Building 05K0068 + 746 + Sweden Building 05K0071 + 293 +

138

NSLS-II Source Properties and Floor Layout  

NLE Websites -- All DOE Office Websites (Extended Search)

NSLS-II Source Properties and Floor Layout NSLS-II Source Properties and Floor Layout April 12, 2010 Contents Basic Storage Ring Parameters Basic and Advanced Source Parameters Brightness Flux Photon Source Size and Divergence Power Infrared Sources Distribution of Sources Available for User Beamlines Floor Layout This document provides a summary of the current NSLS-II source and floor layout parameters. For a more complete description of the NSLS-II accelerator properties planned for NSLS-II, see the NSLS-II Preliminary Design Report Basic NSLS-II Storage Ring Parameters at NSLS-II website. We note that this document summarizes the present status of the design, but that the design continues to be refined and that these parameters may change as part of this process. NSLS-II is designed to deliver photons with high average spectral brightness in the 2 keV to 10 keV

139

Production system improvement : floor area reduction and cycle time analysis  

E-Print Network (OSTI)

A medical device company challenged a research team to reduce the manufacturing floor space required for an occlusion system product by one third. The team first cataloged equipment location and size, detailed the processes ...

Peterson, Jennifer J. (Jennifer Jeanne)

2012-01-01T23:59:59.000Z

140

Moisture Control in Insulated Raised Floor Systems in Southern Louisiana  

E-Print Network (OSTI)

polyisocyanurate foam, open-cell sprayed polyurethane foams of vary- ing vapor permeance, closed-cell sprayed in guidance for insulating raised floors in the hot and humid climate of the Gulf Houses with pier foundations

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Test Plan for K Basin floor sludge consolidated sampling equipment  

SciTech Connect

The purpose of this document is to provide the test procedure for the function and acceptance testing of the K Basin Floor Sludge Consolidated Sampling Equipment. This equipment will be used to transfer K Basin floor sludge to a sludge sampling container for subsequent shipment to an analysis or testing facility. This equipment will provide sampling consistent with data quality objectives and sampling plans currently being developed.

OLIVER, J.W.

1998-10-30T23:59:59.000Z

142

Revel8or: Model Driven Capacity Planning Tool Suite  

SciTech Connect

Designing complex multi-tier applications that must meet strict performance requirements is a challenging software engineering problem. Ideally, the application architect could derive accurate performance predictions early in the project life-cycle, leveraging initial application design-level models and a description of the target software and hardware platforms. To this end, we have developed a capacity planning tool suite for component-based applications, called Revel8tor. The tool adheres to the model driven development paradigm and supports benchmarking and performance prediction for J2EE, .Net and Web services platforms. The suite is composed of three different tools: MDAPerf, MDABench and DSLBench. MDAPerf allows annotation of design diagrams and derives performance analysis models. MDABench allows a customized benchmark application to be modeled in the UML 2.0 Testing Profile and automatically generates a deployable application, with measurement automatically conducted. DSLBench allows the same benchmark modeling and generation to be conducted using a simple performance engineering Domain Specific Language (DSL) in Microsoft Visual Studio. DSLBench integrates with Visual Studio and reuses its load testing infrastructure. Together, the tool suite can assist capacity planning across platforms in an automated fashion.

Zhu, Liming; Liu, Yan; Bui, Ngoc B.; Gorton, Ian

2007-05-31T23:59:59.000Z

143

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

144

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

145

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

146

From Project Sapphire to Today | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

From Project Sapphire to ... From Project Sapphire to ... From Project Sapphire to Today Posted: February 7, 2013 - 6:45pm | Y-12 Report | Volume 9, Issue 2 | 2013 At the 2010 Nuclear Security Summit, President Barack Obama set forth a large-scale effort to aggressively secure the world's vulnerable nuclear material. This effort to reduce the threat of nuclear terrorism was reinforced at the 2012 summit with continued support for the National Nuclear Security Administration's Global Threat Reduction Initiative. But nearly two decades earlier, Y-12 was quietly conducting missions to secure materials from foreign countries with proliferation concerns. In 1994 more than a thousand containers of nuclear material sat in metal racks on the floor in a cold, dilapidated warehouse at the end of a

147

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

148

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

149

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

150

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

151

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

152

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

153

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

154

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

155

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

156

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

157

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

158

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

159

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

160

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

120 Water St., Suite 350 North Andover, MA 01845  

E-Print Network (OSTI)

as lookup tables for stipulated values (measure costs, measure lives, controls savings percentages. 7 http://www1.eere.energy.gov/buildings/appliance_standards/pdfs/epact2005_appliance_stds.pdf 5 ENERGY INDEPENDENCE AND SECURITY ACT OF 2007 (EISA), pg. 86 http://www1.eere.energy.gov/buildings/appliance

162

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

163

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

164

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

165

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

166

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

167

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

168

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

169

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

170

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

171

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

172

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

173

Integration of APECS and VE-Suite for Data Overlay  

Science Conference Proceedings (OSTI)

In the design of advanced power generation facilities, process simulation tools are being utilized to model plant behavior and quickly analyze results. While such tools enable investigation of crucial aspects of plant design, typical commercial process simulators still do not explore some plant design information, including high-fidelity data from computational fluid dynamics (CFD) models of complex thermal and fluid flow phenomena, economics data used for policy decisions, operational data after the plant is constructed, and as-built information for use in as-designed models. Software tools must be created that allow disparate sources of information to be integrated for facilitating accurate and effective plant design. At the Department of Energys (DOE) National Energy Technology Laboratory (NETL), the Advanced Process Engineering Co-Simulator (APECS) has been developed as an integrated software suite that combines process simulation (e.g., Aspen Plus) and high-fidelity equipment simulation (e.g., FLUENT). In this paper, the integration of the high-fidelity CFD data with overall process data in a virtual power simulation environment will be described. More specifically, we will highlight VE-Suite, an open-source virtual engineering (VE) software toolkit, and its support of Aspen Plus Hierarchy blocks via the VE-AspenUnit.

McCorkel, Doug (Iowa State University, Ames, IA); Bivins, Gerrick (Iowa State University, Ames, IA); Jordan, Terry; Bryden, Mark (Iowa State University, Ames, IA); Zitney, S.E.; Widmann, John (ANSYS, Lebanon, NH); Osawe, Maxwell

2008-06-01T23:59:59.000Z

174

Spherical Harmonic Solutions to the 3D Kobayashi Benchmark Suite  

SciTech Connect

Spherical harmonic solutions of order 5, 9 and 21 on spatial grids containing up to 3.3 million cells are presented for the Kobayashi benchmark suite. This suite of three problems with simple geometry of pure absorber with large void region was proposed by Professor Kobayashi at an OECD/NEA meeting in 1996. Each of the three problems contains a source, a void and a shield region. Problem 1 can best be described as a box in a box problem, where a source region is surrounded by a square void region which itself is embedded in a square shield region. Problems 2 and 3 represent a shield with a void duct. Problem 2 having a straight and problem 3 a dog leg shaped duct. A pure absorber and a 50% scattering case are considered for each of the three problems. The solutions have been obtained with Ardra, a scalable, parallel neutron transport code developed at Lawrence Livermore National Laboratory (LLNL). The Ardra code takes advantage of a two-level parallelization strategy, which combines message passing between processing nodes and thread based parallelism amongst processors on each node. All calculations were performed on the IBM ASCI Blue-Pacific computer at LLNL.

Brown, P.N.; Chang, B.; Hanebutte, U.R.

1999-12-29T23:59:59.000Z

175

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

176

NNSA's Military Academic Collaborations | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Military Academic Collaborations | National Nuclear Security Military Academic Collaborations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Video Gallery > NNSA's Military Academic Collaborations NNSA's Military Academic Collaborations NNSA's Military Academic Collaborations The National Nuclear Security Administration (NNSA) Office of Defense Programs offers a suite of activities to enhance collaboration between NNSA's eight sites and the U.S. Military Academies and ROTC programs at other universities. These programs are administered at NNSA and executed at NNSA sites, including the labs, production facilities and the Nevada National Security Site. At each location, leading-edge research and development is carried out on key national security technologies critical to the United States and its allies.

177

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

178

Property:Building/FloorAreaHeatedGarages | Open Energy Information  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Building/FloorAreaHeatedGarages Jump to: navigation, search This is a property of type Number. Floor area for Heated garages (> 10 °C) Pages using the property "Building/FloorAreaHeatedGarages" Showing 15 pages using this property. S Sweden Building 05K0002 + 900 + Sweden Building 05K0007 + 400 + Sweden Building 05K0020 + 300 + Sweden Building 05K0022 + 3,300 + Sweden Building 05K0031 + 2,331 + Sweden Building 05K0033 + 465 + Sweden Building 05K0035 + 1,276 + Sweden Building 05K0037 + 130 + Sweden Building 05K0039 + 580 + Sweden Building 05K0047 + 1,076 + Sweden Building 05K0048 + 340 + Sweden Building 05K0061 + 90 + Sweden Building 05K0067 + 856 + Sweden Building 05K0093 + 2,880 +

179

Property:Building/TotalFloorArea | Open Energy Information  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Building/TotalFloorArea Jump to: navigation, search This is a property of type Number. Total floor area (BRA), m2 Pages using the property "Building/TotalFloorArea" Showing 25 pages using this property. (previous 25) (next 25) S Sweden Building 05K0001 + 19,657 + Sweden Building 05K0002 + 7,160 + Sweden Building 05K0003 + 4,855 + Sweden Building 05K0004 + 25,650 + Sweden Building 05K0005 + 2,260 + Sweden Building 05K0006 + 13,048 + Sweden Building 05K0007 + 24,155 + Sweden Building 05K0008 + 7,800 + Sweden Building 05K0009 + 34,755 + Sweden Building 05K0010 + 437 + Sweden Building 05K0011 + 15,310 + Sweden Building 05K0012 + 22,565 + Sweden Building 05K0013 + 19,551 +

180

Energy Saving in Office Building by Floor Integration System: Reducing  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Saving in Office Building by Floor Integration System: Reducing Energy Saving in Office Building by Floor Integration System: Reducing Total Energy of HVAC and Lighting system using daylight Speaker(s): Yoshifumi Murakami Date: May 20, 2004 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Naoya Motegi Information Technology that is featured by standard communication protocol like Lon Works, BACnet is very useful for managing building systems. Now we can collect much data quickly and easily and to analyze them in detail with this technology. Under the circumstances in that saving energy and reducing CO2 are required strongly, important thing is finding the effective information for building operation and control from collected data and the analysis of them. In our project, the floor integration controller that integrates the each building systems was proposed. It

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Property:Building/FloorAreaShops | Open Energy Information  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Building/FloorAreaShops Jump to: navigation, search This is a property of type Number. Floor area for Shops Pages using the property "Building/FloorAreaShops" Showing 19 pages using this property. S Sweden Building 05K0002 + 900 + Sweden Building 05K0009 + 800 + Sweden Building 05K0012 + 1,587 + Sweden Building 05K0013 + 154 + Sweden Building 05K0017 + 3,150 + Sweden Building 05K0018 + 245 + Sweden Building 05K0019 + 5,600 + Sweden Building 05K0035 + 292 + Sweden Building 05K0046 + 530 + Sweden Building 05K0062 + 940 + Sweden Building 05K0081 + 530 + Sweden Building 05K0086 + 920 + Sweden Building 05K0088 + 1,170 + Sweden Building 05K0089 + 976 + Sweden Building 05K0092 + 360 +

182

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

183

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

184

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

185

PHAST (PHAGE ASSEMBLY SUITE AND TUTORIAL): A WEB-BASED GENOME ASSEMBLY TEACHING TOOL  

E-Print Network (OSTI)

PHAST (PHAGE ASSEMBLY SUITE AND TUTORIAL): A WEB-BASED GENOME as genome assembly. PHAST (Phage Assembly Suite and Tutorial) is an online set small phage genomes of their own. With PHAST, entry-level biology students learn

Campbell, A. Malcolm

186

Robotic Joint Torque Testing: A Critical Tool in the Development of Pressure Suit Mobility Elements  

E-Print Network (OSTI)

Pressure suits allow pilots and astronauts to survive in extreme environments at the edge of Earths atmosphere and in the vacuum of space. One obstacle that pilots and astronauts face is that gas-pressurized suits stiffen ...

Meyen, Forrest Edward

187

Space suit simulator for partial gravity extravehicular activity experimentation and training  

E-Print Network (OSTI)

During human space exploration, mobility is extremely limited when working inside a pressurized space suit. Astronauts perform extensive training on Earth to become accustomed to space suit-imposed high joint torques and ...

Gilkey, Andrea L. (Andrea Lynn)

2012-01-01T23:59:59.000Z

188

User Guide for the STAYSL PNNL Suite of Software Tools  

SciTech Connect

The STAYSL PNNL software suite provides a set of tools for working with neutron activation rates measured in a nuclear fission reactor, an accelerator-based neutron source, or any neutron field to determine the neutron flux spectrum through a generalized least-squares approach. This process is referred to as neutron spectral adjustment since the preferred approach is to use measured data to adjust neutron spectra provided by neutron physics calculations. The input data consist of the reaction rates based on measured activities, an initial estimate of the neutron flux spectrum, neutron activation cross sections and their associated uncertainties (covariances), and relevant correction factors. The output consists of the adjusted neutron flux spectrum and associated covariance matrix, which is useful for neutron dosimetry and radiation damage calculations.

Greenwood, Lawrence R.; Johnson, Christian D.

2013-02-27T23:59:59.000Z

189

MDM Project: Analysis of the Micromechanics Damage Model Suite  

E-Print Network (OSTI)

This report extends a previous study of core algorithms and portability considerations associated with the Micromechanics Damage Model computer software developed by the AFRL Materials Directorate at Wright-Patterson Air Force Base. 1 The MDM analysis suite is comprised of four fracture mechanics codes used to establish design criteria for newly developed composite materials, particularly for brittle, heat-resistant composites associated with the fabrication of turbine blades. The MDM codes are based on a semi-analytical approach in which single coated fibers and the surrounding composite material are represented as a nested set of concentric shells (Fig. 1). Stresses and displacements at prescribed points along the length of the cylinder are determined by evaluation of a polynomial function. Numerically challenging conditions arise during the construction of this function. The calculation of matrix exponentials in terms of the full spectrum of eigenvalues associated with the pri...

D. C. O' neal; R. Luczak; N. J. Pagano; H. W. Brown Iii; G. P. Tandon

2000-01-01T23:59:59.000Z

190

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

191

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

192

Creating suites of models with system entity structure: global warming example  

Science Conference Proceedings (OSTI)

We describe how to develop a suite of models in the MS4 Modeling Environment. The approach employs the operation of merging of System Entity Structures supported by the environment. After construction, the suite of models can be hosted on Model Store, ... Keywords: component-based modeling, suite of models, system entity structure, systems of systems

Bernard P. Zeigler, Chungman Seo, Robert Coop, Doohwan Kim

2013-04-01T23:59:59.000Z

193

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

194

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

195

Sandia secure processor : a native Java processor.  

SciTech Connect

The Sandia Secure Processor (SSP) is a new native Java processor that has been specifically designed for embedded applications. The SSP's design is a system composed of a core Java processor that directly executes Java bytecodes, on-chip intelligent IO modules, and a suite of software tools for simulation and compiling executable binary files. The SSP is unique in that it provides a way to control real-time IO modules for embedded applications. The system software for the SSP is a 'class loader' that takes Java .class files (created with your favorite Java compiler), links them together, and compiles a binary. The complete SSP system provides very powerful functionality with very light hardware requirements with the potential to be used in a wide variety of small-system embedded applications. This paper gives a detail description of the Sandia Secure Processor and its unique features.

Wickstrom, Gregory Lloyd; Gale, Jason Carl; Ma, Kwok Kee

2003-08-01T23:59:59.000Z

196

Property:Building/FloorAreaOffices | Open Energy Information  

Open Energy Info (EERE)

FloorAreaOffices FloorAreaOffices Jump to: navigation, search This is a property of type Number. Floor area for Offices Pages using the property "Building/FloorAreaOffices" Showing 25 pages using this property. (previous 25) (next 25) S Sweden Building 05K0001 + 19,657 + Sweden Building 05K0002 + 5,000 + Sweden Building 05K0003 + 4,360 + Sweden Building 05K0004 + 25,650 + Sweden Building 05K0005 + 2,150 + Sweden Building 05K0006 + 13,048 + Sweden Building 05K0007 + 21,765 + Sweden Building 05K0008 + 7,500 + Sweden Building 05K0009 + 33,955 + Sweden Building 05K0010 + 437 + Sweden Building 05K0011 + 14,080 + Sweden Building 05K0012 + 20,978 + Sweden Building 05K0013 + 15,632 + Sweden Building 05K0014 + 1,338.3 + Sweden Building 05K0015 + 1,550 + Sweden Building 05K0016 + 2,101 +

197

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

198

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

199

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

200

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

202

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

203

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

204

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

205

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

206

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

208

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

209

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

210

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

211

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

212

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

213

October 23, 2012 11:49 World Scientific Review Volume -9in x 6in ywangsmartgrid Smart Grid, Automation, and SCADA Systems Security  

E-Print Network (OSTI)

SCADA protocols: SCADA devices are man- ufactured by different vendors with different proprietary:49 World Scientific Review Volume - 9in x 6in ywangsmartgrid SCADA Security 13 3.3. sSCADA protocol suite The sSCADA protocol suite19 is proposed to overcome the challenges that we have discussed

Wang, Yongge

214

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

215

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

216

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

217

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

First Analysis Securities Corporation First Analysis Securities Corporation Jump to: navigation, search Logo: First Analysis Securities Corporation Name First Analysis Securities Corporation Address One South Wacker Drive, Suite 3900 Place Chicago, Illinois Zip 60606 Product Private equity, venture capital, investment banking and equity research. Year founded 1981 Phone number (312) 258-1400 Website http://www.firstanalysis.com/ Coordinates 41.8819019°, -87.6367295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.8819019,"lon":-87.6367295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

218

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

219

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

220

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

222

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

223

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

224

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

225

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

226

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

227

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

228

Microsoft Word - MHI Letterhead - 2111 Wilson Blvd, Suite 100.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 17, 2010 August 17, 2010 Office of the General Counsel Department of Energy 1000 Independence Avenue, SW Washington, D.C. 20585-0121 Memorandum for the Record Ex Parte Communication Department of Energy Meeting- Wednesday, July 14, 20103:00 - 4:00 p.m. The purpose of the meeting was to provide information to DOE staff on the Advanced Notice of Proposed Rulemaking on Section 414 of the Energy Independence and Security Act (EISA) of 2007 to establish energy standards for manufactured housing. In attendance at the meeting were: Lois Starkey, Manufactured Housing Institute Emanuel Levy, Systems Building Research Alliance David A. Tompos, NTA Inc. Mark Ezzo, Clayton Homes, Inc. Michael Wade, Cavalier Homes, Inc. Michael Jensen, Sara Lynn Bunch, Harry Indig, Dave Conover, Kate Gehringer and

229

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

230

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

231

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

232

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

233

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

234

Modular, security enclosure and method of assembly  

DOE Patents (OSTI)

A transportable, reusable rapidly assembled and disassembled, resizable modular, security enclosure utilizes a stepped panel construction. Each panel has an inner portion and an outer portion which form joints. A plurality of channels can be affixed to selected joints of the panels. Panels can be affixed to a base member and then affixed to one another by the use of elongated pins extending through the channel joints. Alternatively, the base member can be omitted and the panels themselves can be used as the floor of the enclosure. The pins will extend generally parallel to the joint in which they are located. These elongated pins are readily inserted into and removable from the channels in a predetermined sequence to allow assembly and disassembly of the enclosure. A door constructed from panels is used to close the opening to the enclosure.

Linker, Kevin L. (Albuquerque, NM); Moyer, John W. (Albuquerque, NM)

1995-01-01T23:59:59.000Z

235

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

236

Thermal Behavior of Floor Tubes in a Kraft Recovery Boiler  

DOE Green Energy (OSTI)

The temperatures of floor tubes in a slope-floored black liquor recovery boiler were measured using an array of thermocouples located on the tube crowns. It was found that sudden, short duration temperature increases occurred with a frequency that increased with distance from the spout wall. To determine if the temperature pulses were associated with material falling from the convective section of the boiler, the pattern of sootblower operation was recorded and compared with the pattern of temperature pulses. During the period from September, 1998, through February, 1999, it was found that more than 2/3 of the temperature pulses occurred during the time when one of the fast eight sootblowers, which are directed at the back of the screen tubes and the leading edge of the first superheater bank, was operating.

Barker, R.E.; Choudhury, K.A.; Gorog, J.P.; Hall, L.M.; Keiser, J.R.; Sarma, G.B.

1999-09-12T23:59:59.000Z

237

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

238

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

239

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

240

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

SIMON: A mobile robot for floor contamination surveys  

SciTech Connect

The Robotics Development group at the Savannah River Site is developing an autonomous robot to perform radiological surveys of potentially contaminated floors. The robot scans floors at a speed of one-inch/second and stops, sounds an alarm, and flashes lights when contamination in a certain area is detected. The contamination of interest here is primarily alpha and beta-gamma. The contamination levels are low to moderate. The robot, a Cybermotion K2A, is radio controlled, uses dead reckoning to determine vehicle position, and docks with a charging station to replenish its batteries and calibrate its position. It has an ultrasonic collision avoidance system as well as two safety bumpers that will stop the robot's motion when they are depressed. Paths for the robot are preprogrammed and the robot's motion can be monitored on a remote screen which shows a graphical map of the environment. The radiation instrument being used is an Eberline RM22A monitor. This monitor is microcomputer based with a serial I/O interface for remote operation. Up to 30 detectors may be configured with the RM22A. For our purposes, two downward-facing gas proportional detectors are used to scan floors, and one upward-facing detector is used for radiation background compensation. SIMON is interfaced with the RM22A in such a way that it scans the floor surface at one-inch/second, and if contamination is detected, the vehicle stops, alarms, and activates a voice synthesizer. Future development includes using the contamination data collected to provide a graphical contour map of a contaminated area. 3 refs.

Dudar, E.; Teese, G.; Wagner, D.

1991-01-01T23:59:59.000Z

242

SIMON: A mobile robot for floor contamination surveys  

SciTech Connect

The Robotics Development group at the Savannah River Site is developing an autonomous robot to perform radiological surveys of potentially contaminated floors. The robot scans floors at a speed of one-inch/second and stops, sounds an alarm, and flashes lights when contamination in a certain area is detected. The contamination of interest here is primarily alpha and beta-gamma. The contamination levels are low to moderate. The robot, a Cybermotion K2A, is radio controlled, uses dead reckoning to determine vehicle position, and docks with a charging station to replenish its batteries and calibrate its position. It has an ultrasonic collision avoidance system as well as two safety bumpers that will stop the robot`s motion when they are depressed. Paths for the robot are preprogrammed and the robot`s motion can be monitored on a remote screen which shows a graphical map of the environment. The radiation instrument being used is an Eberline RM22A monitor. This monitor is microcomputer based with a serial I/O interface for remote operation. Up to 30 detectors may be configured with the RM22A. For our purposes, two downward-facing gas proportional detectors are used to scan floors, and one upward-facing detector is used for radiation background compensation. SIMON is interfaced with the RM22A in such a way that it scans the floor surface at one-inch/second, and if contamination is detected, the vehicle stops, alarms, and activates a voice synthesizer. Future development includes using the contamination data collected to provide a graphical contour map of a contaminated area. 3 refs.

Dudar, E.; Teese, G.; Wagner, D.

1991-12-31T23:59:59.000Z

243

PHASE CHANGE MATERIALS IN FLOOR TILES FOR THERMAL ENERGY STORAGE  

DOE Green Energy (OSTI)

Passive solar systems integrated into residential structures significantly reduce heating energy consumption. Taking advantage of latent heat storage has further increased energy savings. This is accomplished by the incorporation of phase change materials into building materials used in passive applications. Trombe walls, ceilings and floors can all be enhanced with phase change materials. Increasing the thermal storage of floor tile by the addition of encapsulated paraffin wax is the proposed topic of research. Latent heat storage of a phase change material (PCM) is obtained during a change in phase. Typical materials use the latent heat released when the material changes from a liquid to a solid. Paraffin wax and salt hydrates are examples of such materials. Other PCMs that have been recently investigated undergo a phase transition from one solid form to another. During this process they will release heat. These are known as solid-state phase change materials. All have large latent heats, which makes them ideal for passive solar applications. Easy incorporation into various building materials is must for these materials. This proposal will address the advantages and disadvantages of using these materials in floor tile. Prototype tile will be made from a mixture of quartz, binder and phase change material. The thermal and structural properties of the prototype tiles will be tested fully. It is expected that with the addition of the phase change material the structural properties will be compromised to some extent. The ratio of phase change material in the tile will have to be varied to determine the best mixture to provide significant thermal storage, while maintaining structural properties that meet the industry standards for floor tile.

Douglas C. Hittle

2002-10-01T23:59:59.000Z

244

Property:Building/FloorAreaTotal | Open Energy Information  

Open Energy Info (EERE)

FloorAreaTotal FloorAreaTotal Jump to: navigation, search This is a property of type Number. Total Pages using the property "Building/FloorAreaTotal" Showing 25 pages using this property. (previous 25) (next 25) S Sweden Building 05K0001 + 19,657 + Sweden Building 05K0002 + 7,160 + Sweden Building 05K0003 + 4,454 + Sweden Building 05K0004 + 25,650 + Sweden Building 05K0005 + 2,260 + Sweden Building 05K0006 + 14,348 + Sweden Building 05K0007 + 24,155 + Sweden Building 05K0008 + 7,800 + Sweden Building 05K0009 + 34,755 + Sweden Building 05K0010 + 437 + Sweden Building 05K0011 + 15,300 + Sweden Building 05K0012 + 22,565 + Sweden Building 05K0013 + 19,551 + Sweden Building 05K0014 + 1,338.3 + Sweden Building 05K0015 + 1,550 + Sweden Building 05K0016 + 2,546 +

245

Microsoft Word - OPC Security WP 3 _Version 1-3c_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

intrinsically secure intrinsically secure po box 178 #5 - 7217 Lantzville rd lantzville, bc canada v0r 2h0 office 250.390.1333 fax 250.390.3899 www.byressecurity.com Digital Bond suite 130 1580 sawgrass corp pkwy sunrise, FL 33323 office 954.315.4633 www.digitalbond.com OPC Security Whitepaper #3 Hardening Guidelines for OPC Hosts PREPARED BY: Digital Bond British Columbia Institute of Technology Byres Research November 13, 2007 OPC Security WP 3 (Version 1-3c).doc OPC Security Whitepaper #3 Hardening Guidelines for OPC Hosts OPC Security WP 3 (Version 1-3c).doc ii November 2007 Revision History Revision Date Authors Details 0.7 May 15, 2006 E. Byres, M Franz, Draft internal review version 1.0 May 31, 2006 E. Byres, J. Carter, M Franz Draft for controlled public review

246

Evaluation of Sediment Toxicity Using a Suite of Assessment Tools  

E-Print Network (OSTI)

Accurate characterization of risk of adverse ecological effects related to contaminated sediment presents a particularly difficult challenge. A series of studies has been conducted to investigate the utility of various tools for assessment of sediment toxicity. The goal of this research was to provide information which could help increase the accuracy with which predictions of toxicity could be made at hazardous sites. A calibration study was conducted using model PAHs, PCBs, a binary PAH mixture and a coal-tar mixture. This study was a collaborative effort among five university-based Superfund Research Programs (SRPs). Each program, with the help of funding through the NIEHS Superfund Research Program, has developed a chemical-class specific assay to estimate toxicity of contaminants in sediment. This suite of bioassays expands the range of data typically obtained through the use of standard aquatic toxicity assays. A series of caged in situ exposure studies has been conducted using juvenile Chinook salmon and Pacific staghorn sculpin in the Lower Duwamish Waterway. The study aimed to investigate the utility of selected biomarkers in evaluating the relationship between contaminants present in environmental samples and response in receptors following an in situ caged exposure. Results found that DNA adducts detected in exposed fish were significantly higher than controls in 2004 and 2006, and DNA adducts appear to be a reliable indicator of exposure, although no dose-response relationship was present. Western blot analysis of CYP1A1 was not indicative of exposure levels. The final study conducted was concerned with evaluating the utility of using solid phase microextraction (SPME) fibers in situ to evaluate contaminated sediment. Levels of PAHs and PCBs in sediment often exceeded sediment quality guidelines; however, results from aquatic toxicity bioassays using Hyalella azteca were mostly negative, thus levels of contaminants detected on SPME fibers could not be associated with adverse effects in Hyalella. However, regression analysis of total PAHs present in sediment and levels of PAHs detected in porewater SPME fiber samplers, which were placed 5 cm into the sediment for 30 days, revealed a strongly correlated linear relationship (R2 = .779). Normalization of the sediment data to total organic carbon was performed to determine if the trend would remain present, and the linear relationship was again confirmed (R2 =.709).

Kelley, Matthew A

2010-05-01T23:59:59.000Z

247

Traditional And Angle-dependent Characterization Of Penn States Panel Transmission Loss Suite.  

E-Print Network (OSTI)

??The Center for Acoustics and Vibration at Penn State has a Panel Transmission Loss Suite consisting of a reverberation chamber coupled to an anechoic room. (more)

Bauch, Paul

2013-01-01T23:59:59.000Z

248

Analysis of Thermostat Design for Vertical Fan Coil Units Within Modern Window-Wall Condominium Suites.  

E-Print Network (OSTI)

??The aim for this research is to identify the issues with poor thermostat designs in a window-wall condominium suite during cooling season, and to investigate (more)

Ruff, Shawn

2013-01-01T23:59:59.000Z

249

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

250

Comparison of Routable Control System Security Approaches  

SciTech Connect

This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

2011-06-01T23:59:59.000Z

251

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

252

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

253

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

254

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

255

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

256

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

257

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

258

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

259

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

260

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

262

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

263

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

264

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

265

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

266

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

267

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

268

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

269

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

270

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

271

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

272

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

273

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

274

Fault-based test suite prioritization for specification-based testing  

Science Conference Proceedings (OSTI)

Context: Existing test suite prioritization techniques usually rely on code coverage information or historical execution data that serve as indicators for estimating the fault-detecting ability of test cases. Such indicators are primarily empirical in ... Keywords: Fault class hierarchy, Fault-based prioritization, Fault-based testing, Software testing, Specification-based testing, Test suite prioritization

Yuen Tak Yu; Man Fai Lau

2012-02-01T23:59:59.000Z

275

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

276

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

277

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

278

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

279

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

280

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

282

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

283

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

284

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

285

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

286

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

287

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

288

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

289

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

290

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

291

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

292

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

293

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

294

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

295

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

296

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

297

Low Floor Americans with Disabilities Compliant Alternate Fuel Vehicle Project  

SciTech Connect

This project developed a low emission, cost effective, fuel efficient, medium-duty community/transit shuttle bus that meets American's with Disabilities Act (ADA) requirements and meets National Energy Policy Act requirements (uses alternative fuel). The Low Profile chassis, which is the basis of this vehicle is configured to be fuel neutral to accommodate various alternative fuels. Demonstration of the vehicle in Yellowstone Park in summer (wheeled operation) and winter (track operation) demonstrated the feasibility and flexibility for this vehicle to provide year around operation throughout the Parks system as well as normal transit operation. The unique configuration of the chassis which provides ADA access with a simple ramp and a flat floor throughout the passenger compartment, provides maximum access for all passengers as well as maximum flexibility to configure the vehicle for each application. Because this product is derived from an existing medium duty truck chassis, the completed bus is 40-50% less expensive than existing low floor transit buses, with the reliability and durability of OEM a medium duty truck.

James Bartel

2004-11-26T23:59:59.000Z

298

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

299

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

300

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Property:Building/FloorAreaSchoolsChildDayCare | Open Energy...  

Open Energy Info (EERE)

Jump to: navigation, search This is a property of type Number. Floor area for Schools, including child day-care centres Pages using the property "Building...

302

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

303

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

304

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

305

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

306

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

307

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

308

A Benchmark Suite for Evaluating the Performance of the WebODE Ontology Engineering Platform  

E-Print Network (OSTI)

Abstract. Ontology tools play a key role in the development and maintenance of the Semantic Web. Hence, we need in one hand to objectively evaluate these tools, in order to analyse whether they can deal with actual and future requirements, and in the other hand to develop benchmark suites for performing these evaluations. In this paper, we describe the method we have followed to design and implement a benchmark suite for evaluating the performance of the WebODE ontology engineering workbench, along with the conclusions obtained after using this benchmark suite for evaluating WebODE. 1.

Ral Garca-castro; Asuncin Gmez-prez

2004-01-01T23:59:59.000Z

309

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

310

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

311

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

312

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

313

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

314

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

315

STATISTICAL ANALYSIS OF TANK 5 FLOOR SAMPLE RESULTS  

SciTech Connect

Sampling has been completed for the characterization of the residual material on the floor of Tank 5 in the F?Area Tank Farm at the Savannah River Site (SRS), near Aiken, SC. The sampling was performed by Savannah River Remediation (SRR) LLC using a stratified random sampling plan with volume?proportional compositing. The plan consisted of partitioning the residual material on the floor of Tank 5 into three non?overlapping strata: two strata enclosed accumulations, and a third stratum consisted of a thin layer of material outside the regions of the two accumulations. Each of three composite samples was constructed from five primary sample locations of residual material on the floor of Tank 5. Three of the primary samples were obtained from the stratum containing the thin layer of material, and one primary sample was obtained from each of the two strata containing an accumulation. This report documents the statistical analyses of the analytical results for the composite samples. The objective of the analysis is to determine the mean concentrations and upper 95% confidence (UCL95) bounds for the mean concentrations for a set of analytes in the tank residuals. The statistical procedures employed in the analyses were consistent with the Environmental Protection Agency (EPA) technical guidance by Singh and others [2010]. Savannah River National Laboratory (SRNL) measured the sample bulk density, nonvolatile beta, gross alpha, and the radionuclide1, elemental, and chemical concentrations three times for each of the composite samples. The analyte concentration data were partitioned into three separate groups for further analysis: analytes with every measurement above their minimum detectable concentrations (MDCs), analytes with no measurements above their MDCs, and analytes with a mixture of some measurement results above and below their MDCs. The means, standard deviations, and UCL95s were computed for the analytes in the two groups that had at least some measurements above their MDCs. The identification of distributions and the selection of UCL95 procedures generally followed the protocol in Singh, Armbya, and Singh [2010]. When all of an analytes measurements lie below their MDCs, only a summary of the MDCs can be provided. The measurement results reported by SRNL are listed in Appendix A, and the results of this analysis are reported in Appendix B. The data were generally found to follow a normal distribution, and to be homogenous across composite samples.

Shine, G.

2012-08-03T23:59:59.000Z

316

STATISTICAL ANALYSIS OF TANK 5 FLOOR SAMPLE RESULTS  

SciTech Connect

Sampling has been completed for the characterization of the residual material on the floor of Tank 5 in the F?Area Tank Farm at the Savannah River Site (SRS), near Aiken, SC. The sampling was performed by Savannah River Remediation (SRR) LLC using a stratified random sampling plan with volume?proportional compositing. The plan consisted of partitioning the residual material on the floor of Tank 5 into three non?overlapping strata: two strata enclosed accumulations, and a third stratum consisted of a thin layer of material outside the regions of the two accumulations. Each of three composite samples was constructed from five primary sample locations of residual material on the floor of Tank 5. Three of the primary samples were obtained from the stratum containing the thin layer of material, and one primary sample was obtained from each of the two strata containing an accumulation. This report documents the statistical analyses of the analytical results for the composite samples. The objective of the analysis is to determine the mean concentrations and upper 95% confidence (UCL95) bounds for the mean concentrations for a set of analytes in the tank residuals. The statistical procedures employed in the analyses were consistent with the Environmental Protection Agency (EPA) technical guidance by Singh and others [2010]. Savannah River National Laboratory (SRNL) measured the sample bulk density, nonvolatile beta, gross alpha, and the radionuclide, elemental, and chemical concentrations three times for each of the composite samples. The analyte concentration data were partitioned into three separate groups for further analysis: analytes with every measurement above their minimum detectable concentrations (MDCs), analytes with no measurements above their MDCs, and analytes with a mixture of some measurement results above and below their MDCs. The means, standard deviations, and UCL95s were computed for the analytes in the two groups that had at least some measurements above their MDCs. The identification of distributions and the selection of UCL95 procedures generally followed the protocol in Singh, Armbya, and Singh [2010]. When all of an analytes measurements lie below their MDCs, only a summary of the MDCs can be provided. The measurement results reported by SRNL are listed in Appendix A, and the results of this analysis are reported in Appendix B. The data were generally found to follow a normal distribution, and to be homogenous across composite samples.

Shine, E.

2012-08-01T23:59:59.000Z

317

STATISTICAL ANALYSIS OF TANK 5 FLOOR SAMPLE RESULTS  

Science Conference Proceedings (OSTI)

Sampling has been completed for the characterization of the residual material on the floor of Tank 5 in the F-Area Tank Farm at the Savannah River Site (SRS), near Aiken, SC. The sampling was performed by Savannah River Remediation (SRR) LLC using a stratified random sampling plan with volume-proportional compositing. The plan consisted of partitioning the residual material on the floor of Tank 5 into three non-overlapping strata: two strata enclosed accumulations, and a third stratum consisted of a thin layer of material outside the regions of the two accumulations. Each of three composite samples was constructed from five primary sample locations of residual material on the floor of Tank 5. Three of the primary samples were obtained from the stratum containing the thin layer of material, and one primary sample was obtained from each of the two strata containing an accumulation. This report documents the statistical analyses of the analytical results for the composite samples. The objective of the analysis is to determine the mean concentrations and upper 95% confidence (UCL95) bounds for the mean concentrations for a set of analytes in the tank residuals. The statistical procedures employed in the analyses were consistent with the Environmental Protection Agency (EPA) technical guidance by Singh and others [2010]. Savannah River National Laboratory (SRNL) measured the sample bulk density, nonvolatile beta, gross alpha, radionuclide, inorganic, and anion concentrations three times for each of the composite samples. The analyte concentration data were partitioned into three separate groups for further analysis: analytes with every measurement above their minimum detectable concentrations (MDCs), analytes with no measurements above their MDCs, and analytes with a mixture of some measurement results above and below their MDCs. The means, standard deviations, and UCL95s were computed for the analytes in the two groups that had at least some measurements above their MDCs. The identification of distributions and the selection of UCL95 procedures generally followed the protocol in Singh, Armbya, and Singh [2010]. When all of an analyte's measurements lie below their MDCs, only a summary of the MDCs can be provided. The measurement results reported by SRNL are listed in Appendix A, and the results of this analysis are reported in Appendix B. The data were generally found to follow a normal distribution, and to be homogeneous across composite samples.

Shine, E.

2012-03-14T23:59:59.000Z

318

Statistical Analysis Of Tank 5 Floor Sample Results  

Science Conference Proceedings (OSTI)

Sampling has been completed for the characterization of the residual material on the floor of Tank 5 in the F-Area Tank Farm at the Savannah River Site (SRS), near Aiken, SC. The sampling was performed by Savannah River Remediation (SRR) LLC using a stratified random sampling plan with volume-proportional compositing. The plan consisted of partitioning the residual material on the floor of Tank 5 into three non-overlapping strata: two strata enclosed accumulations, and a third stratum consisted of a thin layer of material outside the regions of the two accumulations. Each of three composite samples was constructed from five primary sample locations of residual material on the floor of Tank 5. Three of the primary samples were obtained from the stratum containing the thin layer of material, and one primary sample was obtained from each of the two strata containing an accumulation. This report documents the statistical analyses of the analytical results for the composite samples. The objective of the analysis is to determine the mean concentrations and upper 95% confidence (UCL95) bounds for the mean concentrations for a set of analytes in the tank residuals. The statistical procedures employed in the analyses were consistent with the Environmental Protection Agency (EPA) technical guidance by Singh and others [2010]. Savannah River National Laboratory (SRNL) measured the sample bulk density, nonvolatile beta, gross alpha, and the radionuclide, elemental, and chemical concentrations three times for each of the composite samples. The analyte concentration data were partitioned into three separate groups for further analysis: analytes with every measurement above their minimum detectable concentrations (MDCs), analytes with no measurements above their MDCs, and analytes with a mixture of some measurement results above and below their MDCs. The means, standard deviations, and UCL95s were computed for the analytes in the two groups that had at least some measurements above their MDCs. The identification of distributions and the selection of UCL95 procedures generally followed the protocol in Singh, Armbya, and Singh [2010]. When all of an analyte's measurements lie below their MDCs, only a summary of the MDCs can be provided. The measurement results reported by SRNL are listed in Appendix A, and the results of this analysis are reported in Appendix B. The data were generally found to follow a normal distribution, and to be homogenous across composite samples.

Shine, E. P.

2012-08-01T23:59:59.000Z

319

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

320

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

322

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

323

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

324

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

325

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

326

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

327

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

328

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

329

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

330

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

331

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

332

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

333

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

334

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

335

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

336

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

337

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

338

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

339

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

340

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

342

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI für Informatik Univ. Tübingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

343

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

344

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

345

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

346

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

347

Ubiquitous Indoor Localization and Worldwide Automatic Construction of Floor Plans  

E-Print Network (OSTI)

Although GPS has been considered a ubiquitous outdoor localization technology, we are still far from a similar technology for indoor environments. While a number of technologies have been proposed for indoor localization, they are isolated efforts that are way from a true ubiquitous localization system. A ubiquitous indoor positioning system is envisioned to be deployed on a large scale worldwide, with minimum overhead, to work with heterogeneous devices, and to allow users to roam seamlessly from indoor to outdoor environments. Such a system will enable a wide set of applications including worldwide seamless direction finding between indoor locations, enhancing first responders' safety by providing anywhere localization and floor plans, and providing a richer environment for location-aware social networking applications. We describe an architecture for the ubiquitous indoor positioning system (IPS) and the challenges that have to be addressed to materialize it. We then focus on the feasibility of automating ...

Youssef, Moustafa; Elkhouly, Reem; Lotfy, Amal

2012-01-01T23:59:59.000Z

348

Strategy Guideline: Quality Management in Existing Homes; Cantilever Floor Example  

SciTech Connect

This guideline is designed to highlight the QA process that can be applied to any residential building retrofit activity. The cantilevered floor retrofit detailed in this guideline is included only to provide an actual retrofit example to better illustrate the QA activities being presented. The goal of existing home high performing remodeling quality management systems (HPR-QMS) is to establish practices and processes that can be used throughout any remodeling project. The research presented in this document provides a comparison of a selected retrofit activity as typically done versus that same retrofit activity approached from an integrated high performance remodeling and quality management perspective. It highlights some key quality management tools and approaches that can be adopted incrementally by a high performance remodeler for this or any high performance retrofit. This example is intended as a template and establishes a methodology that can be used to develop a portfolio of high performance remodeling strategies.

Taggart, J.; Sikora, J.; Wiehagen, J.; Wood, A.

2011-12-01T23:59:59.000Z

349

OLENDER REPORTING, INC. 1100 Connecticut Ave., NW, Suite 810, Washington, DC  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

100 Connecticut Ave., NW, Suite 810, Washington, DC 100 Connecticut Ave., NW, Suite 810, Washington, DC 20036 Washington: (202) 898-1108 / Baltimore: (410) 752-3376 Toll Free: (888) 445-3376 1 Electricity Advisory Committee Meeting 8:33 a.m. through 2:49 p.m. October 29, 2010 OLENDER REPORTING, INC. 1100 Connecticut Ave., NW, Suite 810, Washington, DC 20036 Washington: (202) 898-1108 / Baltimore: (410) 752-3376 Toll Free: (888) 445-3376 2 National Rural Electric Cooperative Conference Center 4301 Wilson Boulevard Arlington, VA 22203 OLENDER REPORTING, INC. 1100 Connecticut Ave., NW, Suite 810, Washington, DC 20036 Washington: (202) 898-1108 / Baltimore: (410) 752-3376 Toll Free: (888) 445-3376 3 ELECTRICITY ADVISORY MEMBERS PRESENT: Richard Cowart

350

Development of a mechanical counter pressure Bio-Suit System for planetary exploration  

E-Print Network (OSTI)

Extra-vehicular activity (EVA) is critical for human spaceflight and particularly for human planetary exploration. The MIT Man Vehicle Laboratory is developing a Bio-Suit EVA System, based on mechanical counterpressure ...

Sim, Zhe Liang

2006-01-01T23:59:59.000Z

351

DC Pro Software Tool Suite, Data Center Fact Sheet, Industrial Technologies Program  

Science Conference Proceedings (OSTI)

This fact sheet describes how DOE's Data Center Energy Profiler (DC Pro) Software Tool Suite and other resources can help U.S. companies identify ways to improve the efficiency of their data centers.

Not Available

2009-04-01T23:59:59.000Z

352

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

353

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

354

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

355

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

356

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

357

Fleet-Wide Prognostic and Health Management Suite: Beta Testing Results  

Science Conference Proceedings (OSTI)

The Fleet-Wide Prognostic and Health Management software suite (FW-PHM) is an integrated suite of web-based diagnostic and prognostic tools and databases specifically developed for the Electric Power Research Institute by Expert Microsystems for use in the commercial power industry (both nuclear and fossil fuel). FW-PHM serves as an integrated health management framework, managing the functionality needed for a complete implementation of automated diagnostics and prognostics. The open-architecture ...

2013-05-16T23:59:59.000Z

358

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

359

Experimental Study of the Floor Radiant Cooling System Combined with Displacement Ventilation  

E-Print Network (OSTI)

As a comfortable and energy-efficient air conditioning system, the application of floor radiant heating system is used increasingly greatly in the north of China. As a result, the feasibility of floor radiant cooling has gained more attention. To examine the thermodynamic performance of the floor radiant cooling system, we measured the operational conditions including the minimum floor surface temperature, the cooling capacity, and the indoor temperature field distribution under different outdoor temperatures in Beijing. Because the ground temperature changes with the mean temperature of the supplied and returned water and room temperature, the mean temperature of the supplied and retuned water was obtained. Finally, we analyzed the phenomenon of dewing and developed measures for preventing it. The dry air layer near the floor formed by a displacement ventilation system can effectively prevent dews on the surface of the floor in the wet and hot days in summer. In addition, for the sake of the displacement ventilation system, the heat transfer effect between floor and space is enhanced. Our analysis pointed out that floor radiant cooling system combined with displacement ventilation ensures good comfort and energy efficiency.

Ren, Y.; Li, D.; Zhang, Y.

2006-01-01T23:59:59.000Z

360

A Comparison of Meteorological Observations from South Pole Station before and after Installation of a New Instrument Suite  

Science Conference Proceedings (OSTI)

The AmundsenScott South Pole surface meteorological instrument suite was upgraded in 2004. To ensure that the new and old instruments were recording similar information, the two suites of instruments ran simultaneously for a year. Statistical ...

L. M. Keller; K. A. Baker; M. A. Lazzara; J. Gallagher

2009-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Property:Building/FloorAreaUnheatedRentedPremises | Open Energy Information  

Open Energy Info (EERE)

FloorAreaUnheatedRentedPremises FloorAreaUnheatedRentedPremises Jump to: navigation, search This is a property of type Number. Floor area for Unheated but rented-out premises (garages) < 10 °C Pages using the property "Building/FloorAreaUnheatedRentedPremises" Showing 6 pages using this property. S Sweden Building 05K0021 + 700 + Sweden Building 05K0050 + 760 + Sweden Building 05K0058 + 1,200 + Sweden Building 05K0080 + 2,000 + Sweden Building 05K0081 + 700 + Sweden Building 05K0102 + 234 + Retrieved from "http://en.openei.org/w/index.php?title=Property:Building/FloorAreaUnheatedRentedPremises&oldid=285964#SMWResults" What links here Related changes Special pages Printable version Permanent link Browse properties 429 Throttled (bot load) Error 429 Throttled (bot load)

362

Numerical Simulation of Thermal Performance of Floor Radiant Heating System with Enclosed Phase Change Material  

E-Print Network (OSTI)

In the present paper, a kind of enclosed phase change material (PCM) used in solar and low-temperature hot water radiant floor heating is investigated. On the basis of obtaining the best performance of PCM properties, a new radiant heating structure of the energy storage floor is designed,which places heat pipes in the enclosed phase change material (PCM) layer, without concrete in it. The PCM thermal storage time is studied in relation to the floor surface temperature under different low-temperature hot water temperatures. With the method of enthalpy , the PCM thermal storage time is studied under different supply water temperatures, supply water flows, distances between water wipe in the floor construction, floor covers and insulation conditions.

Qiu, L.; Wu, X.

2006-01-01T23:59:59.000Z

363

Security Assessment Simulation Toolkit (SAST) Final Report  

Science Conference Proceedings (OSTI)

The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

2009-11-15T23:59:59.000Z

364

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

365

A systematic review of security requirements engineering  

Science Conference Proceedings (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

366

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

367

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

368

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

369

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

370

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

371

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

372

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

373

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

374

Enforcement Regulations and Directives - Security | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Regulations and Directives - Security Classified Information Security 10 C.F.R Part 824 - Procedural Rules for the Assessment of Civil Penalties for Classified...

375

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

376

Lemnos Interoperable Security Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Program More Documents & Publications SECURITY CORE FUNCTION AND DEFINITION REPORT Lemnos Interoperable Security DOE National SCADA Test Bed Program Multi-Year Plan...

377

Security Orchestration with IF-MAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 7. ...

2012-10-26T23:59:59.000Z

378

Office of Headquarters Security Operations - Headquarters Facilities...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations HomeIntroduction Physical Security Limited Areas and Vault-Type Rooms Personnel Security Foreign Ownership, Control or Influence; Facility...

379

DOE Headquarters Security Quick Reference Book | Navigation  

NLE Websites -- All DOE Office Websites (Extended Search)

TECH. & INFO. SECURITY TEAM HOME COVER | INTRODUCTION SECURITY ACRONYMS TABLE OF CONTENTS HEADQUARTERS SECURITY OFFICER PROTECTIVE FORCE UNCLASSIFIED FOREIGN VISITS & ASSIGNMENTS...

380

Office of Headquarters Security Operations: Headquarters Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Office of Security Operations: Director's Message  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Home Sub Offices HQ Security Officers (HSO) Program Office of Security Operations Office of Information Security Office of...

382

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

383

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

384

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

9.2.2 Security Interdependence . . . . . . Bounded Control7 Security Constrained Networked Control 7.1Inputs 9 Security Interdependencies for Networked 9.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

385

Global Environmental Change and Human Security  

E-Print Network (OSTI)

with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

Kunnas, Jan

2011-01-01T23:59:59.000Z

386

National Security & Safety Reports | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security & Safety Reports National Security & Safety Reports October 29, 2013 Evaluation Report: IG-0897 The Department of Energy's Unclassified Cyber Security Program -...

387

Security and Performance Considerations in Wireless Networks  

E-Print Network (OSTI)

ACM Workshop on Wireless Security, 2004. [3] ISM Wide-bandTraffic Flows. In Network Security Lab (NSL) Technicalthe Challenges of Security in a Mobile Environment. In

Pelechrinis, Konstantinos

2010-01-01T23:59:59.000Z

388

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

389

Security and United States Immigration Policy  

E-Print Network (OSTI)

Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

Totten, Robbie James

2012-01-01T23:59:59.000Z

390

Visitor_Security_and_Safety_Information  

NLE Websites -- All DOE Office Websites (Extended Search)

in a designated lot near the main lobby and auditorium. Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations United...

391

Security, Emergency Planning & Safety Records | Department of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

392

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

393

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

394

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

395

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

396

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

397

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Mithra...

398

An Introduction to Computer Security: the NIST Handbook  

Science Conference Proceedings (OSTI)

An Introduction to Computer Security: the NIST Handbook Keywords: computer security, contingency planning, cryptography, guidance, information assurance, risk management, security audit, security controls, security policy

Barbara Guttman; Edward A. Roback

1995-10-01T23:59:59.000Z

399

Experiment System Analysis of an Indirect Expansion Solar Assisted Water Source Heat Pump Radiant Floor Heating System  

Science Conference Proceedings (OSTI)

A solar assisted water source heat pump for Radiant Floor Heating (SWHP-RFH) experimental system with heat pipe vacuum tube solar collector as heating source and radiant floor as terminal device is proposed in the paper. The Mathematics Model of dynamic ... Keywords: solar energy, water source heat pump, radiant floor heating systems, system dynamic COP

Qu Shilin; Ma Fei; Liu Li; Yue Jie

2009-10-01T23:59:59.000Z

400

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... cyber maryLaNd summit. Please NOTE -- Last Updated Wednesday, January 20, 2010. PRESENTATIONS: ... NIST Voting Cyber Security: ...

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Georgia Technology Information Security Center (GTISC); Idaho State University National Center of Academic Excellence in Information Assurance: ...

402

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Incident Response. Contingency Planning and Disaster Response; Incident Identification, Reporting, and Response. Back to Top Security Controls. ...

403

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... to security control selection and specification considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders ...

404

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and OMB have instituted laws, regulations, and directives that govern ... August 2004, Homeland Security Presidential Directive/Hspd-12 Subject ...

405

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... The PRISMA is based upon existing federal directives including Federal Information Security Management Act (FISMA), NIST guidelines and other ...

406

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Special Publication 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security; February ...

407

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... PIV Implementation, Daniel Wood, Treasury; Electricity Subsector Cybersecurity ... Basic Input/Output System (BIOS) Security - Andrew Regenscheid ...

408

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... North Korean nuclear proliferation - using distributed ... in a Collaborative Environment - "to investigate ... can fulfil the current security requirements of ...

409

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... security including, but not limited to: accreditation, audit trails, authorization ... US Department of Energy Computer Incident Advisory Capability (CIAC ...

410

Nuclear Safeguards and Security | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

411

More on Finding a Single Number to Indicate Overall Performance of a Benchmark Suite  

E-Print Network (OSTI)

The topic of finding a single number to summarize overall performance over a benchmark suite is continuing to be a difficult issue 14 years after Smiths paper [1]. While significant insight into the problem has been provided by Smith [1], Hennessey and Patterson [2], Cragon [3], etc, the research community still seems to be unclear on the correct mean to use for different performance metrics. How should metrics obtained from individual benchmarks be aggregated to present a summary of the performance over the entire suite? What are valid central tendency measures over the whole benchmark suite for speedup, CPI, IPC, MIPS, MFLOPS, cache miss rates, cache hit rates, branch misprediction rates, etc? Arithmetic mean has been touted to be appropriate for

Lizy Kurian John

2004-01-01T23:59:59.000Z

412

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

413

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

414

Climate Change and National Security  

Science Conference Proceedings (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communitieswith resultant advantages and differences. Climate change research has ...

Elizabeth L. Malone

2013-01-01T23:59:59.000Z

415

Departmental Personnel Security- Clearance Automation  

Energy.gov (U.S. Department of Energy (DOE))

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

416

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Planning and Management DOE M 470.4-1, Chg 2, dated 102010, Safeguards and Security Program Planning and Management Physical Security DOE NAP 70.2, Chg 1, dated 72011,...

417

Security Services Management (Section B)  

Science Conference Proceedings (OSTI)

To take the next step in information security, Security Services Management provides a comprehensive approach to managing people, process, and technology through the sound application of metrics. This book demonstrates how to develop a balanced strategy ...

James S. Tiller

2007-07-01T23:59:59.000Z

418

Security_Walls_VPP_Award  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Force Recognized for Outstanding Safety CARLSBAD, N.M., May 10, 2013 - The U.S. Department of Energy (DOE) has awarded Security Walls, LLC, the Waste Isolation Pilot...

419

Security Ontology for Annotating Resources  

E-Print Network (OSTI)

Abstract. Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ontologies in other domains that focus on annotation of functional aspects of resources. Types of security information that could be described include mechanisms, protocols, objectives, algorithms, and credentials in various levels of detail and specificity. The NRL Security Ontology is more comprehensive and better organized than existing security ontologies. It is capable of representing more types of security statements and can be applied to any electronic resource. The class hierarchy of the ontology makes it both easy to use and intuitive to extend. We applied this ontology to a Service Oriented Architecture to annotate security aspects of Web service descriptions and queries. A refined matching algorithm was developed to perform requirement-capability matchmaking that takes into account not only the ontology concepts, but also the properties of the concepts. 1

Anya Kim; Jim Luo; Myong Kang

2005-01-01T23:59:59.000Z

420

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

FOIA | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

422

Distribution System Cyber Security Architecture  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) has developed the NISTIR 7628: Guidelines for Smart Grid Cyber Security, while ASAP-SG has developed both the Security Profile for AMI (v2.0) and the Security Profile for Distribution Management. These documents are necessarily high level and generic, covering a broad range of smart grid assets, and focus exclusively on determining the security requirements. However, utilities and their vendors often cannot get a clear picture of what existing tec...

2010-12-31T23:59:59.000Z

423

Secure Systems and Applications Group  

Science Conference Proceedings (OSTI)

... technologies, and on developing security solutions ... the earliest stages of technology development through proof ... industry, and to develop tests, test ...

2013-01-17T23:59:59.000Z

424

Pollux | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Pollux | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

425

Testimonials | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Testimonials | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

426

Training | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

427

Counterterrorism | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

428

Vocabulary | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

429

Pantex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

430

Awards | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

431

Policy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

432

Supercomputers | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

433

Engineering | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

434

Contacts | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

435

Accomplishments | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

436

Preparedness | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

437

Public | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

438

Recovery | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

439

Nonproliferation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

440

Overview | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Mission | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

442

Operations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

443

Conferences | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

444

Planning | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

445

5.6 Security Monitoring  

Science Conference Proceedings (OSTI)

... monitoring of the cloud-provider infrastructure to demonstrate compliance with cloud-subscriber security policies and auditing requirements. ...

2010-11-02T23:59:59.000Z

446

Compensation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

447

Convert | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

448

Protect | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

449

Leave | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

450

International | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

451

Remove | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

452

Interdiction | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

453

Features | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

454

Security Aspects of Electronic Voting  

Science Conference Proceedings (OSTI)

Security Aspects of Electronic Voting. Summary: The Help America Vote Act (HAVA) of 2002 was passed by Congress to ...

2013-08-01T23:59:59.000Z

455

Department of Homeland Security Workshop  

Science Conference Proceedings (OSTI)

Homeland Security Modeling and Simulation Workshop. Purpose: This workshop is a joint effort of US Department of Homeland ...

2011-06-14T23:59:59.000Z

456

X-ray Security Screening  

Science Conference Proceedings (OSTI)

National and International Standards for X-ray Security Screening Applications. Summary: The primary objective of this ...

2013-03-13T23:59:59.000Z

457

Model Driven Security Functional Testing  

Science Conference Proceedings (OSTI)

Model Driven Security Functional Testing. Summary: Model-Driven Engineering (MDE) is emerging as a promising approach ...

2013-01-15T23:59:59.000Z

458

Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI  

E-Print Network (OSTI)

Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

Jurjens, Jan

459

Presented by National Security College  

E-Print Network (OSTI)

of maritime security, the Taiwan question, and the US-China nuclear balance and extended deterrence. HePresented by National Security College Japan Institute Strategic and Defence Studies Centre Department of Political and Social Change ARC Centre of Excellence in Policing and Security Pivotal Alliance

460

Security for wireless sensor networks  

Science Conference Proceedings (OSTI)

This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks. A survey of current WSN security research is presented. The security issues of Mobile Ad-Hoc Networks and infrastructure ... Keywords: WSN, security, sensor networks, wireless

Sasikanth Avancha; Jeffrey Undercoffer; Anupam Joshi; John Pinkston

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Secure collaborations over message boards  

Science Conference Proceedings (OSTI)

We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed architecture employs only efficient symmetric cryptographic principles, and ... Keywords: collaborative systems, cryptography, key predistribution, message boards, networks, secure collaboration, security, service attacks, trust modules

Mahalingam Ramkumar; Nasir Memon

2006-09-01T23:59:59.000Z

462

Security & Sustainability College of Charleston  

E-Print Network (OSTI)

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10 we can think about generating greater security and prosperity through systemic change that arises, then providing security is paramount consideration along that path. Using frames of collective, national

Young, Paul Thomas

463

CALENDAR YEAR 2011 ANNUAL SECURITY  

E-Print Network (OSTI)

CALENDAR YEAR 2011 ANNUAL SECURITY FIRE SAFETY REPORT& #12;University of North Dakota Annual Security & Fire Safety Report: Calendar Year 2011 n Page 1 Dear Community Member: I am pleased to introduce the 2011 Annual Security and Fire Safety Report for the University of North Dakota. This report

Delene, David J.

464

MINIMUM SECURITY REQUIREMENTS FOR FEDERAL  

E-Print Network (OSTI)

March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

465

Security and Verification Provable cryptography  

E-Print Network (OSTI)

Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

466

Visitor Guide to Smart Security  

E-Print Network (OSTI)

Visitor Guide to Smart Security The following articles are prohibited on LANL property, including and are not allowed in Limited Security Areas or above: · personal computers and associated media (including palm- top capabilities, unless disabled). Note 1: Government cell phones are allowed into Security Areas as long

467

Security SmartMay 2007 View and download all Security Smarts for your safety and security meetings  

E-Print Network (OSTI)

Security SmartMay 2007 View and download all Security Smarts for your safety and security meetings http://int.lanl.gov/security/documents/index.shtml#security-smarts Stop! Before You Snap That Photo-employed workers/camera users must obtain approval from their security-responsible line manager (SRLM

468

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

469

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

470

NISTIR 7751, Computer Security Division 2010 Annual  

Science Conference Proceedings (OSTI)

... 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 14 ... 10. NISTIR 7628, Guidelines for Smart Grid Cyber Security. ...

2012-03-01T23:59:59.000Z

471

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Independent Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations...

472

GARS | Nonproliferation and National Security Department  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and National Security Department Nonproliferation The Nonproliferation and National Security Department carries out research and development, provides technical...

473

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

474

Events and Conferences | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Areas Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Events and Conferences Events...

475

Advanced Metering Infrastructure Security Considerations | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Metering Infrastructure Security Considerations Advanced Metering Infrastructure Security Considerations The purpose of this report is to provide utilities implementing Advanced...

476

22nd National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... Techniques Dr. Roshan Thomas, NAI Labs ... Kubic, National Security Agency Tom Shake, MIT ... Security Implementations Bret Hartman, Concept Five ...

2000-10-25T23:59:59.000Z

477

NNSA: Securing Domestic Radioactive Material | National Nuclear...  

National Nuclear Security Administration (NNSA)

Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

478

Fifth Annual Health Information Security Conference Runs ...  

Science Conference Proceedings (OSTI)

... conference is an opportunity for HIPAA security rule implementers; security, privacy and compliance officers; assessment teams and audit staff in ...

2012-04-17T23:59:59.000Z

479

Comprehensive National Cyber Security: Leap-Ahead ...  

Science Conference Proceedings (OSTI)

Comprehensive National Cyber Security: Leap-Ahead Security for Interconnected Systems (+10 FTE, +$5,500,000). Challenge. image: ...

2010-10-05T23:59:59.000Z

480

Security Testing, Validation and Measurement Group  

Science Conference Proceedings (OSTI)

Security Testing, Validation and Measurement Group. Welcome. ... The overall security of an enterprise network cannot be Contact. ...

2013-01-17T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Integrating Security RMF with Requirements Management J ...  

Science Conference Proceedings (OSTI)

Integrating Security RMF with Requirements Management J Peeler ... Security controls at Low Risk are risk accepted & may not need mitigation. ...

2013-12-13T23:59:59.000Z

482

Public Safety and Security Information in MML  

Science Conference Proceedings (OSTI)

Public Safety and Security Information in MML. ... MML plays a key role in enhancing the nation's homeland security. Through ...

2010-10-05T23:59:59.000Z

483

Security Configuration Checklists for IT Commercial Products  

Science Conference Proceedings (OSTI)

Security Configuration Checklists for Commercial IT Products. ... The use of checklists improves the consistency and predictability of system security. ...

2013-01-15T23:59:59.000Z

484

Homeland Security and Emergency Management Coordination (HSEMC...  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation...

485

Production system improvement at a medical devices company : floor layout reduction and manpower analysis  

E-Print Network (OSTI)

Due to the low demand and the need to introduce other production lines in the floor, the medical devices company wants to optimize the utilization of space and manpower for the occlusion system product. This thesis shows ...

AlEisa, Abdulaziz A. (Abdulaziz Asaad)

2012-01-01T23:59:59.000Z

486

Pressure Fluctuations on the Open-Ocean Floor off the Gulf of California: Tides, Earthquakes, Tsunamis  

Science Conference Proceedings (OSTI)

This paper supplements an initial article on sea-floor pressure observations conducted with a sensitive though not perfectly stable transducer. A variety of examples are used to demonstrate that a wide range of research subjects in the fields ...

Jean H. Filloux

1983-05-01T23:59:59.000Z

487

FOILFEST :community enabled security.  

SciTech Connect

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

488

Asian Energy Security  

Science Conference Proceedings (OSTI)

OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of regional coordination on energy issues in Northeast Asia. The paragraphs below summarize Nautilus' plans for the AES project in the coming months.

Peter Hayes, PhD

2003-12-01T23:59:59.000Z

489

GEORG-AUGUST-UNIVERSITT Computer Security  

E-Print Network (OSTI)

GEORG-AUGUST-UNIVERSIT?T G?TTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

Grabowski, Jens

490

SECURITY TECHNIQUES Chris J Mitchell1  

E-Print Network (OSTI)

SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

Mitchell, Chris

491

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

492

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

493

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Conference Proceedings (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

494

On Test Suite Composition and Cost-Effective Regression Testing. Gregg Rothermel  

E-Print Network (OSTI)

On Test Suite Composition and Cost-Effective Regression Testing. Gregg Rothermel , Sebastian Elbaum}@cse.unl.edu August 30, 2003 Abstract Regression testing is an expensive testing process used to re-validate software as it evolves. Various methodologies for improving regression testing processes have been explored, but the cost

Rothermel, Gregg

495

On Test Suite Composition and Cost-Effective Regression Testing Gregg Rothermel  

E-Print Network (OSTI)

On Test Suite Composition and Cost-Effective Regression Testing Gregg Rothermel , Sebastian Elbaum}@cse.unl.edu August 31, 2004 Abstract Regression testing is an expensive testing process used to re-validate software as it evolves. Various methodologies for improving regression testing processes have been explored, but the cost

Rothermel, Gregg

496

Minimizing test suites in software product lines using weight-based genetic algorithms  

Science Conference Proceedings (OSTI)

Test minimization techniques aim at identifying and eliminating redundant test cases from test suites in order to reduce the total number of test cases to execute, thereby improving the efficiency of testing. In the context of software product line, ... Keywords: fault detection capability, feature pairwise coverage, test minimization, weight-based gas

Shuai Wang; Shaukat Ali; Arnaud Gotlieb

2013-07-01T23:59:59.000Z

497

An overview of the HDF5 technology suite and its applications  

Science Conference Proceedings (OSTI)

In this paper, we give an overview of the HDF5 technology suite and some of its applications. We discuss the HDF5 data model, the HDF5 software architecture and some of its performance enhancing capabilities. Keywords: HDF5, data management, data models, databases

Mike Folk; Gerd Heber; Quincey Koziol; Elena Pourmal; Dana Robinson

2011-03-01T23:59:59.000Z

498

Hydrogen Storage Systems Analysis Meeting 955 L'Enfant Plaza North, SW, Suite 6000  

E-Print Network (OSTI)

Hydrogen Storage Systems Analysis Meeting 955 L'Enfant Plaza North, SW, Suite 6000 Washington, DC, 2005 #12;SUMMARY REPORT Hydrogen Storage Systems Analysis Meeting March 29, 2005 955 L'Enfant Plaza was to familiarize the DOE research community involved in hydrogen storage materials and process development

499

VAMPIRE microarray suite: a web-based platform for the interpretation of gene expression data  

E-Print Network (OSTI)

the increased computational load. Since all of these transactions are stored in the VAMPIRE database, no dataVAMPIRE microarray suite: a web-based platform for the interpretation of gene expression data of analysis, collectively known as variance-modeled posterior inference with regional exponentials (VAMPIRE

500

Design and Experiments of a Solar Low-temperature Hot Water Floor Radiant Heating System  

E-Print Network (OSTI)

The solar low-temperature hot water floor radiant heating system combines solar energy heating with floor radiant heating. This kind of environmental heating way not only saves fossil resources and reduces pollution, but also makes people feel more comfortable. First, the authors devised an experimental scheme and set up the laboratory. Second, we collected a great deal of data on the system in different situations. Finally, we conclude that such heating system is feasible and one of the best heating methods.

Wu, Z.; Li, D.

2006-01-01T23:59:59.000Z