Powered by Deep Web Technologies
Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

2

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

3

T-610: Red Hat kdenetwork security update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat kdenetwork security update 0: Red Hat kdenetwork security update T-610: Red Hat kdenetwork security update April 26, 2011 - 7:11am Addthis PROBLEM: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. An attacker could use this flaw to create a specially-crafted Metalink file that, when opened, would cause KGet to overwrite arbitrary files accessible to the user running KGet. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. reference LINKS: RHSA-2011:0465-1 CVE-2011-1586 RH Classification RH Updates Support

4

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

5

An Evaluation Framework for Kernel-Mode Security Modules  

Science Conference Proceedings (OSTI)

Kernel-mode security enhancement technologies are widely used to improve the efficiency of data processing and the security of data and operating systems in recent years. However, the security modules have been implemented without consolidated standards, ... Keywords: evaluation, Kernel-mode, Security Module, interface

Hui Zhang; Shenghong Chen; Yuqin Sun; Xiamu Niu

2008-08-01T23:59:59.000Z

6

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

7

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

8

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

9

U-200: Red Hat Directory Server Information Disclosure Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Successful exploitation of the security issue requires that the audit log is enabled (disabled by default). 2) The vulnerability is caused due to an error when changing password...

10

jFort/HAT Cryptographic Module Security Policy Version 3.3  

Science Conference Proceedings (OSTI)

... 5 6 7 8 Wafer Flat (this side of die) Page 11. jFort/HAT ... (Not shown in Figure 1 on page 2.) The removal-resistant metal-alloy Tin Roof that coats ...

11

A security enforcement kernel for OpenFlow networks  

Science Conference Proceedings (OSTI)

Software-defined networks facilitate rapid and open innovation at the network control layer by providing a programmable network infrastructure for computing flow policies on demand. However, the dynamism of programmable networks also introduces new security ... Keywords: openflow, policy enforcement, security

Philip Porras; Seungwon Shin; Vinod Yegneswaran; Martin Fong; Mabry Tyson; Guofei Gu

2012-08-01T23:59:59.000Z

12

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

13

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

14

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute 80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code January 12, 2012 - 9:00am Addthis PROBLEM: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code PLATFORM: Linux ABSTRACT: A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Linux Kernel Update SecurityTracker Alert ID: 1026512 CVE-2012-0038 Red Hat Bugzilla Bug 773280 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a filesystem that, when mounted by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted

15

The Design and Specification of a Security Kernel for the PDP ...  

Science Conference Proceedings (OSTI)

... security requirements), and provides a basis for testing a subsequent ... Seg.ne:nts . rii"e ... intuition and ad hoc techniques,' and 'tested ~:to the point ...

2013-04-15T23:59:59.000Z

16

T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Red Hat system-config-firewall Lets Local Users Gain Root 1: Red Hat system-config-firewall Lets Local Users Gain Root Privileges T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges July 19, 2011 - 2:42pm Addthis PROBLEM: A vulnerability was reported in Red Hat system-config-firewall. A local user can obtain root privileges on the target system. PLATFORM Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat system-config-firewall Lets Local Users Gain Root Privileges reference LINKS: RHSA-2011:0953-1 SecurityTracker Alert ID: 1025793 CVE-2011-2520 Red hat Article ID: 11259 IMPACT ASSESSMENT: Medium Discussion: The system-config-firewall utility uses the Python pickle module in an

17

V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Network Satellite Server Inter-Satellite Sync Remote 3: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass May 24, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server PLATFORM: Red Hat Network Satellite (v. 5.3 for RHEL 5) Red Hat Network Satellite (v. 5.4 for RHEL 5) Red Hat Network Satellite (v. 5.4 for RHEL 6) Red Hat Network Satellite (v. 5.5 for RHEL 5) Red Hat Network Satellite (v. 5.5 for RHEL 6) ABSTRACT: The system does not properly validate all Inter-Satellite Sync operations REFERENCE LINKS: SecurityTracker Alert ID: 1028587 RHSA-2013:0848-1 CVE-2013-2056 IMPACT ASSESSMENT: Medium DISCUSSION: It was discovered that Red Hat Network Satellite did not fully check the

18

T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet 8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service July 28, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in Red Hat Enterprise Virtualization Hypervisor. A remote user can cause denial of service conditions. PLATFORM: Red Hat Enterprise Virtualization-hypervisor package. ABSTRACT: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service. reference LINKS: RHSA-2011:1090-1 SecurityTracker Alert ID: 1025853 CVE-2011-1576 RHBA-2011:1068-1,Hypervisor is based on KVM - Bug Fix Advisory IMPACT ASSESSMENT: Medium Discussion: A flaw was found that allowed napi_reuse_skb() to be called on VLAN

19

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

20

V-138: Red Hat update for icedtea-web | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Red Hat update for icedtea-web 8: Red Hat update for icedtea-web V-138: Red Hat update for icedtea-web April 19, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for icedtea-web PLATFORM: Red Hat Enterprise Linux Desktop 6 Red Hat Enterprise Linux HPC Node 6 Red Hat Enterprise Linux Server 6 Red Hat Enterprise Linux Workstation 6 ABSTRACT: This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions REFERENCE LINKS: Secunia Advisory SA53109 RHSA-2013:0753-1 CVE-2013-1926 CVE-2013-1917 IMPACT ASSESSMENT: Medium DISCUSSION: An error within the browser plugin uses the same class loader for applets with the same codebase paths, which can be exploited to gain information about or to manipulate currently running applets from other domains.

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets 0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges August 8, 2012 - 7:00am Addthis PROBLEM: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux Desktop (v. 5 client) ABSTRACT: An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5. reference LINKS: Advisory: RHSA-2012:1149-1 SecurityTracker Alert ID: 1027356 Sudo Main Page Bugzilla 844442 CVE-2012-3440 IMPACT ASSESSMENT: Medium Discussion: A local user can exploit a temporary file symbolic link flaw in the %postun

22

Mexican Hat | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mexican Hat Mexican Hat Mexican Hat January 1, 2009 - 12:00pm Addthis US Department of Energy Groundwater Database Groundwater Master Report Installation Name, State: Mexican Hat Responsible DOE Office: Office of Legacy Management Plume Name: Mexican Hat Remediation Contractor: SM Stoller Corporation Report Last Updated: 2009 Contaminants Halogenated VOCs/SVOCs Present? No Fuel Present? No Metals Present? No Isotopes Present? No Explosives Present? No Other Contaminants? No Tritium Present? No Nitrates Present? No Sulfates Present? No Hydrogeology Conduit Flow? No Depth (feet): 0 Mulitple Units Affected? No Avg Velocity (feet/year): 0 Plume Information Source: Controlled Area of Plume (acres): 0 Plume Status: Plume static or shrinking in size Remedial Approach

23

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

24

V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Red Hat Enterprise MRG Messaging Qpid Python Certificate 8: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks July 12, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Red Hat Enterprise MRG Messaging. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A remote user can conduct a man-in-the-middle attack to access potentially sensitive information REFERENCE LINKS: SecurityTracker Alert ID: 1028774 Redhat Advisory RHSA-2013:1024-1 CVE-2013-1909 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not properly validate the remote server's TLS/SSL certificates. A remote user can conduct a man-in-the-middle attack to

25

V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Linux Kernel "iscsi_add_notunderstood_response()" Buffer 9: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow Vulnerability V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow Vulnerability June 3, 2013 - 12:01am Addthis PROBLEM: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow Vulnerability PLATFORM: Linux Kernel 3.0.x Linux Kernel 3.2.x Linux Kernel 3.4.x Linux Kernel 3.9.x ABSTRACT: A vulnerability has been reported in Linux Kernel. REFERENCE LINKS: Secunia Advisory SA53670 Red Hat Bugzilla - Bug 968036 CVE-2013-2850 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within the "iscsi_add_notunderstood_response()" function (drivers/target/iscsi/iscsi_target_parameters.c) when parsing keys and can

26

Top Hat Pressure System Hyperbaric Test Analysis | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Top Hat Pressure System Hyperbaric Test Analysis Top Hat Pressure System Hyperbaric Test Analysis This file contains data from pressure measurements inside Top Hat 4....

27

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Network Satellite Server Request Validation Flaw 9: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks June 17, 2011 - 3:43pm Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server. A remote user can conduct cross-site request forgery attacks. PLATFORM: Versions 5.4.x ABSTRACT: The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1025674 RHSA-2011:0879-1 RHN Support CVE-2009-4139 IMPACT ASSESSMENT:

28

V-233: Red Hat update for JBoss Fuse | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

3: Red Hat update for JBoss Fuse 3: Red Hat update for JBoss Fuse V-233: Red Hat update for JBoss Fuse September 3, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for JBoss Fuse PLATFORM: Red Hat JBoss Fuse 6.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS. REFERENCE LINKS: Secunia Advisory SA54683 Redhat Advisory RHSA-2013:1185-1 CVE-2013-0269 CVE-2013-1768 CVE-2013-1821 CVE-2013-2160 IMPACT ASSESSMENT: Medium DISCUSSION: A flaw was found in the logging performed during deserialization of the BrokerFactory class in Apache OpenJPA. A remote attacker able to supply a serialized instance of the BrokerFactory class, which will be deserialized on a server, could use this flaw to write an executable file to the

29

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability January 23, 2012 - 9:00am Addthis PROBLEM: Linux Kernel "/proc//mem" Privilege Escalation Vulnerability. PLATFORM: Linux Kernel 2.6.x ABSTRACT: A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges reference LINKS: Linux Kernel Update CVE-2012-0056 Red Hat Bugzilla Bug 782642 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to the kernel not properly restricting access to "/proc//mem" file, which can be exploited to gain escalated privileges by e.g. writing into the memory of a privileged process.

30

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

31

T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

05: Linux Kernel Weakness in Sequence Number Generation 05: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks August 30, 2011 - 3:46am Addthis PROBLEM: A remote user can conduct packet injection attacks. PLATFORM: Linux Kernel ABSTRACT: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. reference LINKS: SecurityTracker Alert ID: 1025977 CVE-2011-3188 (under review) The Linux Kernel Archives IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in the Linux Kernel. A remote user can conduct packet injection attacks. The kernel's sequence number generation function uses partial MD4 with 24-bits unguessable. A remote user may be able to brute-force guess a valid sequence number to inject a packet into a

32

Nonextensive entropic kernels  

Science Conference Proceedings (OSTI)

Positive definite kernels on probability measures have been recently applied in structured data classification problems. Some of these kernels are related to classic information theoretic quantities, such as mutual information and the Jensen-Shannon ...

Andr F. T. Martins; Mrio A. T. Figueiredo; Pedro M. Q. Aguiar; Noah A. Smith; Eric P. Xing

2008-07-01T23:59:59.000Z

33

DOE - Office of Legacy Management -- Mexican Hat Mill Site -...  

Office of Legacy Management (LM)

Act Title I Disposal Sites-Mexican Hat, Utah, Disposal Site. LMSS09461. February 2013 Historic Fact Sheet: Mexican Hat Disposal Site Uranium ore was processed near Mexican...

34

Microsoft Word - HAT-2012_Final.docx  

Office of Legacy Management (LM)

Mexican Hat, Utah Mexican Hat, Utah Page 12-1 12.0 Annual Inspection of the Mexican Hat, Utah, UMTRCA Title I Disposal Site 12.1 Compliance Summary The Mexican Hat, Utah, Uranium Mill Tailings Radiation Control Act (UMTRCA) Title I Disposal Site was inspected on April 3, 2012. The disposal cell was in excellent condition. The U.S. Department of Energy (DOE) site lead and three inspectors from the U.S. Nuclear Regulatory Commission (NRC) were part of the annual inspection. The cell condition was unchanged from the previous year. Minor fence repair was performed near the beginning of the north diversion channel. A slight rockslide near perimeter sign P22 loosened fence strands, and a radiation protection sign was missing from perimeter sign P31; these repairs are the only future

35

Microsoft Word - HAT 2008-final.doc  

Office of Legacy Management (LM)

Mexican Hat, Utah Mexican Hat, Utah Page 12-1 12.0 Mexican Hat, Utah, Disposal Site 12.1 Compliance Summary The Mexican Hat, Utah, Uranium Mill Tailings Radiation Control Act (UMTRCA) Title I Disposal Site was inspected on April 29, 2008. The disposal cell and all associated surface water diversion and drainage structures were in excellent condition and functioning as designed. Runoff from storm events continues to transport sediment into the west diversion channel, resulting in low-density vegetation growth within the entire length of the channel; however, the performance of the diversion channel has not been impaired. Vandalism continues at the site as indicated by new bullets holes in several perimeter signs. The seismic monitoring station installed on site in 2007 as part of the EarthScope USArray Project continues to collect data.

36

Advanced Development of Certified OS Kernels  

E-Print Network (OSTI)

Operating System (OS) kernels form the bedrock of all system softwarethey can have the greatest impact on the resilience, extensibility, and security of todays computing hosts. A single kernel bug can easily wreck the entire systems integrity and protection. We propose to apply new advances in certified software [86] to the development of a novel OS kernel. Our certified kernel will offer safe and application-specific extensibility [8], provable security properties with information flow control, and accountability and recovery from hardware or application failures. Our certified kernel builds on proof-carrying code concepts [74], where a binary executable includes a rigorous machine-checkable proof that the software is free of bugs with respect to specific requirements. Unlike traditional verification systems, our certified software approach uses an expressive general-purpose meta-logic and machine-checkable proofs to support modular reasoning about sophisticated invariants. The rich meta-logic enables us to verify all kinds of low-level

Zhong Shao (pi; Bryan Ford (co-pi

2010-01-01T23:59:59.000Z

37

U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets 2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges August 23, 2012 - 7:00am Addthis PROBLEM: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Linux Kernel 3.2.x Linux Kernel 3.4.x Linux Kernel 3.5.x ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1027434 Secunia Advisory SA50323 CVE-2012-3520 IMPACT ASSESSMENT: Medium Discussion: A local user can obtain elevated privileges on the target system. A local user may be able to send specially crafted Netlink messages to spoof SCM_CREDENTIALS and perform actions with elevated privileges.

38

Recent advances in kernel machines  

Science Conference Proceedings (OSTI)

This talk will review recent advances in the kernel methods focusing on support vector machines (SVM) for pattern recognition. Topics discussed include the kernel design issue through the multi kernel approach and the optimization issue with emphasis ...

Stphane Canu

2010-11-01T23:59:59.000Z

39

Adaptive kernel principal component analysis  

Science Conference Proceedings (OSTI)

An adaptive kernel principal component analysis (AKPCA) method, which has the flexibility to accurately track the kernel principal components (KPC), is presented. The contribution of this paper may be divided into two parts. First, KPC are recursively ... Keywords: Adaptive method, Kernel principal component, Kernel principal component analysis, Non-stationary data, Recursive algorithm

Mingtao Ding; Zheng Tian; Haixia Xu

2010-05-01T23:59:59.000Z

40

T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Linux Kernel dns_resolver Key Processing Error Lets Local 1: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services March 7, 2011 - 3:05pm Addthis PROBLEM: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services. PLATFORM: Linux Kernel 2.6.37 and prior versions ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID:1025162 Latest Stable Kernel CVE-2011-1076 IMPACT ASSESSMENT: High Discussion: When a DNS resolver key is instantiated with an error indication, a local user can attempt to read the key to trigger a null pointer dereference and cause a kernel crash. A local user can cause the target system to crash.

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets 7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code November 16, 2011 - 7:43am Addthis PROBLEM: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Kernel version 2.6.x ABSTRACT: A remote server can cause the target connected client to crash. reference LINKS: The Linux Kernel Archives CVE-2011-4131 SecurityTracker Alert ID: 1026324 Linux Kernel [PATCH 1/1] NFSv4 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in the Linux Kernel. A remote user can cause denial of service conditions. Impact: A remote server can return specially crafted data to the connected target

42

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol 2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability December 15, 2011 - 8:00am Addthis PROBLEM: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability. PLATFORM: Versions Prior to Pidgin 2.10.1 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux Optional Productivity Application 5 server RedHat Enterprise Linux ES 4 RedHat Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected

43

U-070:Redhat krb5 Critical Security Update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70:Redhat krb5 Critical Security Update 70:Redhat krb5 Critical Security Update U-070:Redhat krb5 Critical Security Update December 28, 2011 - 8:30am Addthis PROBLEM: redhat krb5 Critical Security Update PLATFORM: RHEL Desktop Workstation (v. 5 client) Red Hat Desktop (v. 4) Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux Desktop (v. 5 client) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 4) ABSTRACT: Vulnerability can be exploited by malicious people to compromise a vulnerable system. REFERENCE LINKS: RHSA-2011:1851-2 MITKRB5-SA-2011-008 Secunia Advisory: SA47357 Secunia Advisory: SA47359 RH Bugzilla: 770325 CVE-2011-4862 JC3-CIRC Tech Bulletin U-069 IMPACT ASSESSMENT: High Discussion: krb5 telnet daemon is not enabled by default in any version of Red Hat

44

TABL Longer Hard Hat description-Sept 26.PDF  

NLE Websites -- All DOE Office Websites (Extended Search)

Hat Use and Inspection Hat Use and Inspection Hard hats are an important piece of personal protective equipment (PPE). Hard hats worn at Berkeley Lab must comply with the requirements of ANSI Z89.1 for impact protection and electrical performance. PPE can only be effective if it is used properly and the wearer understands its limitations, care, and maintenance. OSHA 29 CFR 1910.132 requires that PPE be maintained in a sanitary and reliable condition. Defective or damaged equipment should never be used. To inspect PPE, emp loyees should follow manufacturer's recommendations for specific inspection procedures. Hard Hat Inspection - Bullard Hard Hats Bullard 3000 hard hats are available at LBL Central Stores, located in B78. Bullard User Information provides detailed inspection procedures for all Bullard hard hats.

45

T-649: Red Hat Network Satellite Server Request Validation Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Red Hat Network Satellite 5.4.1 are advised to upgrade to these updated spacewalk-java packages, which resolve this issue. For this update to take effect, Red Hat Network...

46

U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root 6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am Addthis PROBLEM: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges. PLATFORM: Linux kernel ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1026395 CVE-2011-4330 IMPACT ASSESSMENT: Medium Discussion: When a specially crafted Hierarchical File System (HFS) file system is mounted, a local user can to trigger a buffer overflow and execute arbitrary code on the target system with root privileges. The vulnerability resides in the hfs_mac2asc() function. Impact: A local user can obtain root privileges on the target system.

47

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

48

Microsoft Windows Vista Kernel Mode Security Support ...  

Science Conference Proceedings (OSTI)

... Corporation on the issues discussed as ... 24 6 OPERATIONAL ENVIRONMENT ..... ... key is EOR'ed with ...

2012-09-07T23:59:59.000Z

49

Ichnology, sedimentology, stratigraphy, and trace fossil-permeability relationships in the Upper Cretaceous Medicine Hat Member, Medicine Hat gas field, southeast Alberta, Canada.  

E-Print Network (OSTI)

??The Upper Cretaceous Medicine Hat Member (Niobrara Formation) in western Canada contains abundant reserves of biogenic natural gas. In the Medicine Hat gas field area (more)

La Croix, Andrew David

2010-01-01T23:59:59.000Z

50

Kernel Optimizations in SORD  

NLE Websites -- All DOE Office Websites (Extended Search)

Kernel Optimizations in SORD Kernel Optimizations in SORD earthquake dynamic rupture code Geoffrey P. Ely Leadership Computing Facility Argonne National Laboratory MiraCon March 7, 2013 S C E C an NSF+USGS center Acknowledgements Tareq Malas King Abdullah Univ. of Science & Technology Vitali Morozov Argonne Leadership Computing Facility Karen Magerlein IBM Watson Research Center Simulation Scale Outer length scale: ~500km Inner length scale: ~50m Mesh points: ~10 12 Spatial Derivatives f (⇠) = n X ↵, , =0 N ↵ (⇠)f ↵ rf = @f @⇠ · J 1 x y z ⇠ ⌘ ⇣ Equations of Motion Viscoelastic Solid (Kelvin-Voigt Model) Free surface boundary condition ¨ u = 1 ⇢ r · g = r(u + ˙ u) = trace(g) + µ(g + g T ) ⇢ density , µ elastic moduli viscosity u displacement stress tensor ⌧ = · ˆ n = 0 ! Kernel with 12 Streams do l = 1, 400 do k = 1, 400

51

What if you could actually trust your kernel?  

Science Conference Proceedings (OSTI)

The advent of formally verified OS kernels means that for the first time we have a truly trustworthy foundation for systems. In this paper we explore the design space this opens up. The obvious applications are in security, although not all of them are ...

Gernot Heiser; Leonid Ryzhyk; Michael Von Tessin; Aleksander Budzynowski

2011-05-01T23:59:59.000Z

52

T-669: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

69: Linux Kernel GFS2 Allocation Error Lets Local Users Deny 69: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service T-669: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service July 15, 2011 - 2:14am Addthis PROBLEM: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. PLATFORM: 2.6.39 and prior versions ABSTRACT: Linux Kernel GFS2 Allocation Error Lets Local Users Deny Service. references LINKS: SecurityTracker Alert ID: 1025776 Linux Kernel Updates CVE-2011-2689 IMPACT ASSESSMENT: Medium Discussion: A local user can invoke the gfs2_fallocate() function in 'fs/gfs2/file.c' in certain cases to allocate a non-blksize aligned amount, resulting in an error in subsequent code that requires blksize aligned offsets. Impact: A local user can cause denial of service conditions on the target system.

53

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

54

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

55

Multiple kernel learning with gaussianity measures  

Science Conference Proceedings (OSTI)

Kernel methods are known to be effective for nonlinear multivariate analysis. One of the main issues in the practical use of kernel methods is the selection of kernel. There have been a lot of studies on kernel selection and kernel learning. Multiple ...

Hideitsu Hino; Nima Reyhani; Noboru Murata

2012-07-01T23:59:59.000Z

56

Better bases for kernel spaces  

E-Print Network (OSTI)

In this article we investigate the feasibility of constructing stable, local bases for computing with kernels. In particular, we are interested in constructing families $(b_{\\xi})_{\\xi\\in\\Xi}$ that function as bases for kernel spaces $S(k,\\Xi)$ so that each basis function is constructed using very few kernels. In other words, each function $b_{\\zeta}(x) = \\sum_{\\xi\\in\\Xi} A_{\\zeta,\\xi} k(x,\\xi)$ is a linear combination of samples of the kernel with few nonzero coefficients $A_{\\zeta,\\xi}$. This is reminiscent of the construction of the B-spline basis from the family of truncated power functions. We demonstrate that for a large class of kernels (the Sobolev kernels as well as many kernels of polyharmonic and related type) such bases exist. In fact, the basis elements can be constructed using a combination of roughly $O(\\log N)^d$ kernels, where $d$ is the local dimension of the manifold and $N$ is the dimension of the kernel space (i.e. $N=#\\Xi$). Viewing this as a preprocessing step -- the construction of the...

Fuselier, E J; Narcowich, F J; Ward, J D; Wright, G B

2011-01-01T23:59:59.000Z

57

V-072: Red Hat update for java-1.7.0-openjdk | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72: Red Hat update for java-1.7.0-openjdk V-072: Red Hat update for java-1.7.0-openjdk January 18, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for...

58

Robotic intelligence kernel  

DOE Patents (OSTI)

A robot platform includes perceptors, locomotors, and a system controller. The system controller executes a robot intelligence kernel (RIK) that includes a multi-level architecture and a dynamic autonomy structure. The multi-level architecture includes a robot behavior level for defining robot behaviors, that incorporate robot attributes and a cognitive level for defining conduct modules that blend an adaptive interaction between predefined decision functions and the robot behaviors. The dynamic autonomy structure is configured for modifying a transaction capacity between an operator intervention and a robot initiative and may include multiple levels with at least a teleoperation mode configured to maximize the operator intervention and minimize the robot initiative and an autonomous mode configured to minimize the operator intervention and maximize the robot initiative. Within the RIK at least the cognitive level includes the dynamic autonomy structure.

Bruemmer, David J. (Idaho Falls, ID)

2009-11-17T23:59:59.000Z

59

Halocarbon and Other Atmospheric Trace Species (HATS) | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Halocarbon and Other Atmospheric Trace Species (HATS) Halocarbon and Other Atmospheric Trace Species (HATS) Agriculture Community Menu DATA APPS EVENTS DEVELOPER STATISTICS COLLABORATE ABOUT Agriculture You are here Data.gov » Communities » Agriculture » Data Halocarbon and Other Atmospheric Trace Species (HATS) Dataset Summary Description The general mission of the Halocarbons and other Atmospheric Trace Species group is to quantify the distributions and magnitudes of sources and sinks for atmospheric nitrous oxide (N2O) and halogen containing compounds. HATS utilizes numerous types of platforms, including ground-based stations, towers, ocean vessels, aircraft, and balloons, to accomplish its mission. For a detailed mission statement, consult our FAQ. Tags {"nitrous oxide","sulfur hexaflouride",CFC-11,CFC-12,CFC-113,CCl4,CH3CCl3,CH3Cl,halon-1211,HCFC-22,HCFC-142b,halocarbons,chromatograph,aircraft,balloons,vessels,ships,towers,"natural resources",environment,air,"GHG "}

60

Sparse RBF Networks with Multi-kernels  

Science Conference Proceedings (OSTI)

While the conventional standard radial basis function (RBF) networks are based on a single kernel, in practice, it is often desirable to base the networks on combinations of multiple kernels. In this paper, a multi-kernel function is introduced by combining ... Keywords: Multi-kernel, Neural networks, Nonlinear system identification, Radial function basis

Lihua Fu; Meng Zhang; Hongwei Li

2010-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Heat kernel expansion: user's manual  

E-Print Network (OSTI)

The heat kernel expansion is a very convenient tool for studying one-loop divergences, anomalies and various asymptotics of the effective action. The aim of this report is to collect useful information on the heat kernel coefficients scattered in mathematical and physical literature. We present explicit expressions for these coefficients on manifolds with and without boundaries, subject to local and non-local boundary conditions, in the presence of various types of singularities (e.g., domain walls). In each case the heat kernel coefficients are given in terms of several geometric invariants. These invariants are derived for scalar and spinor theories with various interactions, Yang-Mills fields, gravity, and open bosonic strings. We discuss the relations between the heat kernel coefficients and quantum anomalies, corresponding anomalous actions, and covariant perturbation expansions of the effective action (both "low-" and "high-energy" ones).

D. V. Vassilevich

2003-06-15T23:59:59.000Z

62

DOE - Office of Legacy Management -- MexHat  

Office of Legacy Management (LM)

Utah Utah Mexican Hat, Utah, Disposal Site This Site All Sites All LM Quick Search Key Documents and Links All documents are Adobe Acrobat files. pdf_icon Key Documents Fact Sheet 2012 Annual Site Inspection and Monitoring Report for Uranium Mill Tailings Radiation Control Act Title I Disposal Sites-Mexican Hat, Utah, Disposal Site Communications and Outreach Plan for the Navajo Nation Uranium Mill Tailings Radiation Control Act Sites Long-Term Surveillance Plan for the Mexican Hat, Utah (UMTRCA Title I), Disposal Site San Juan County, Utah Please be green. Do not print these documents unless absolutely necessary. Request a paper copy of any document by submitting a Document Request. All Site Documents All documents are Adobe Acrobat files. pdf_icon Fact Sheet

63

ORBITAL ORIENTATIONS OF EXOPLANETS: HAT-P-4b IS PROGRADE AND HAT-P-14b IS RETROGRADE  

SciTech Connect

We present observations of the Rossiter-McLaughlin effect for two exoplanetary systems, revealing the orientations of their orbits relative to the rotation axes of their parent stars. HAT-P-4b is prograde, with a sky-projected spin-orbit angle of {lambda} = -4.9 {+-} 11.9 deg. In contrast, HAT-P-14b is retrograde, with {lambda} = 189.1 {+-} 5.1 deg. These results conform with a previously noted pattern among the stellar hosts of close-in giant planets: hotter stars have a wide range of obliquities and cooler stars have low obliquities. This, in turn, suggests that three-body dynamics and tidal dissipation are responsible for the short-period orbits of many exoplanets. In addition, our data revealed a third body in the HAT-P-4 system, which could be a second planet or a companion star.

Winn, Joshua N.; Albrecht, Simon [Department of Physics and Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Howard, Andrew W.; Marcy, Geoffrey W.; Isaacson, Howard [Department of Astronomy, University of California, Mail Code 3411, Berkeley, CA 94720 (United States); Johnson, John Asher; Crepp, Justin R.; Morton, Timothy D. [Department of Astrophysics and NASA Exoplanet Science Institute, California Institute of Technology, MC 249-17, Pasadena, CA 91125 (United States); Shporer, Avi [Las Cumbres Observatory Global Telescope Network, 6740 Cortona Drive, Suite 102, Santa Barbara, CA 93117 (United States); Bakos, Gaspar A.; Hartman, Joel D.; Holman, Matthew J. [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States)

2011-02-15T23:59:59.000Z

64

Blind multiuser detection based on kernel approximation  

Science Conference Proceedings (OSTI)

A kernel based multiuser detection (MUD) scheme in code-division multiple-access (CDMA) system is proposed. In this scheme, the support vector (SV) under support vector (SVM) framework is obtained through a kernel sparsity approximation, which regulates ...

Tao Yang; Bo Hu

2006-05-01T23:59:59.000Z

65

Forecasting foreign exchange rates using kernel methods  

Science Conference Proceedings (OSTI)

First, the all-important no free lunch theorems are introduced. Next, kernel methods, support vector machines (SVMs), preprocessing, model selection, feature selection, SVM software and the Fisher kernel are introduced and discussed. A hidden Markov ... Keywords: Forecasting, Foreign exchange, Kernel methods

Martin Sewell; John Shawe-Taylor

2012-07-01T23:59:59.000Z

66

Adaptive wiener image restoration kernel  

DOE Patents (OSTI)

A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

Yuan, Ding (Henderson, NV)

2007-06-05T23:59:59.000Z

67

Structural Modelling with Sparse Kernels  

Science Conference Proceedings (OSTI)

A widely acknowledged drawback of many statistical modelling techniques, commonly used in machine learning, is that the resulting model is extremely difficult to interpret. A number of new concepts and algorithms have been introduced by researchers to ... Keywords: ANOVA, Kernel methods, model interpretability, sparse structure, transparency

S. R. Gunn; J. S. Kandola

2002-09-01T23:59:59.000Z

68

Oil and Gas Flow Data from the Top Hat and from the Choke Line...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flow Data from the Top Hat and from the Choke Line - XLS Oil and Gas Flow Data from the Top Hat and from the Choke Line - XLS Updated through 12:00 AM on July 10, 2010...

69

T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux Kernel sigqueueinfo() Process Lets Local Users Send 53: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals June 23, 2011 - 4:49am Addthis PROBLEM: Userland should be able to trust the pid and uid of the sender of a signal if the si_code is SI_TKILL. PLATFORM: Version(s): prior to 2.6.38 ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases. reference LINKS: OSVDB ID: 71652 SecurityTracker Alert ID: 1025690 Linux Update CVE-2011-1182 Linux Reference 1 Linux Reference 2 IMPACT ASSESSMENT: High Discussion: A local user with the ability to send signals to a process can spoof the uid and pid of the sending process via the sigqueueinfo() system call.

70

Orbital Orientations of Exoplanets: Hat-p-4b is Prograde and Hat-p-14b is Retrograde  

E-Print Network (OSTI)

We present observations of the Rossiter-McLaughlin effect for two exoplanetary systems, revealing the orientations of their orbits relative to the rotation axes of their parent stars. HAT-P-4b is prograde, with a sky-projected ...

Winn, Joshua Nathan

71

Design of specific-to-problem kernels and use of kernel weighted K-nearest neighbours for time series modelling  

Science Conference Proceedings (OSTI)

Least squares support vector machines (LSSVM) with Gaussian kernel represent the most used of the kernel methods existing in the literature for regression and time series prediction. These models have a good behaviour for these types of problems due ... Keywords: Kernel methods, Kernel weighted K-Nearest Neighbours, Least squares support vector machines, Parallelization of kernel methods, Specific to problem kernels, Time series modelling

Gins Rubio; Luis Javier Herrera; Hctor Pomares; Ignacio Rojas; Alberto Guilln

2010-06-01T23:59:59.000Z

72

Microsoft Word - CX-Hat_Rock_Switch_14June2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7, 2013 7, 2013 REPLY TO ATTN OF: KEC-4 SUBJECT: Environmental Clearance Memorandum Glenn Russell Project Manager -TPCV-TPP-4 Proposed Action: Hat Rock Switching Station Replacement Project Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B4.6 Additions and modifications to transmission facilities Location: Umatilla County, Oregon Proposed by: Bonneville Power Administration (BPA) Description of the Proposed Action: BPA proposes to fund PacifiCorp's rebuild of BPA's Hat Rock Tap Switching Station, which is located within PacifiCorp's McNary-Wallula 230-kilovolt (kV) transmission line right-of-way (ROW). Rebuilding the switching station would include the replacement of sectionalizing switches, the grounding grid, and all signage. The approximately 0.5-acre yard would

73

Microsoft PowerPoint - Enterprise Top Hat Phases - 07-04-2010.pptx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hat Contingency Story Board Hat Contingency Story Board (Flange Removal and Flange Spool Assembly/Capping Stack Installation) July 4, 2010 Top Hat Contingency Decision Tree Top Hat Contingency Options Starting Condition: Top Hat (TH) #4 deployed from Discoverer Enterprise (DE) Main. When capping operation begins, DE moves to standby position, recovers TH#4 and DE LMRP, and then deploys TH#10 on DE Main. Top Hat #4 on DE Main Flange Bolt Removal Top Hat #10 on DE Main Contingency: If none of the bolts can be removed or if there is a problem and previously removed bolts can be re-installed, land TH#10 over top flex joint flange. Flange Bolt Removal Contingency: If only some of the bolts can be removed or if the flange cannot be removed after the bolts are out, install Contingency Ring (CR) A, and

74

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

75

$?(\\hat{x},\\hat{p})-$deformation of the harmonic oscillator in a $2D-$phase space  

E-Print Network (OSTI)

This work addresses a ${\\theta}(\\hat{x},\\hat{p})-$deformation of the harmonic oscillator in a $2D-$phase space. Specifically, it concerns a quantum mechanics of the harmonic oscillator based on a noncanonical commutation relation depending on the phase space coordinates. A reformulation of this deformation is considered in terms of a $q-$deformation allowing to easily deduce the energy spectrum of the induced deformed harmonic oscillator. Then, it is proved that the deformed position and momentum operators admit a one-parameter family of self-adjoint extensions. These operators engender new families of deformed Hermite polynomials generalizing usual $q-$ Hermite polynomials. Relevant matrix elements are computed. Finally, a $su(2)-$algebra representation of the considered deformation is investigated and discussed.

M. N. Hounkonnou; D. Ousmane Samary; E. Baloitcha; S. Arjika

2012-11-01T23:59:59.000Z

76

Reproducing kernels of Sobolev spaces via a green kernel approach with differential operators and boundary operators  

Science Conference Proceedings (OSTI)

We introduce a vector differential operator P and a vector boundary operator B to derive a reproducing kernel along with its associated Hilbert space which is shown to be embedded in a ... Keywords: 41A30, 65D05, Boundary operator, Differential operator, Eigenfunction, Eigenvalue, Green kernel, Reproducing kernel

Gregory E. Fasshauer; Qi Ye

2013-05-01T23:59:59.000Z

77

LightWeight KerneL  

NLE Websites -- All DOE Office Websites (Extended Search)

Catamount n-Way LightWeight KerneL 1 R&D 100 Entry Catamount n-Way LightWeight KerneL 2 R&D 100 Entry Submitting organization Sandia National Laboratories PO Box 5800 Albuquerque,...

78

Simulation Problem Analysis and Research Kernel | Open Energy...  

Open Energy Info (EERE)

Simulation Problem Analysis and Research Kernel Jump to: navigation, search Tool Summary Name: Simulation Problem Analysis and Research Kernel AgencyCompany Organization:...

79

Object Oriented Verification Kernels for Secure Java Applications  

Science Conference Proceedings (OSTI)

This paper presents an approach to the verification of large Java programs. The focus lies on programs that implement a distributed communicating system e.g. in a Mor E-Commerce scenario. When trying to verify such programs, thousands of Java classes ...

Holger Grandy; Kurt Stenzel; Wolfgang Reif

2005-09-01T23:59:59.000Z

80

Microsoft Windows Server 2008 Kernel Mode Security Support ...  

Science Conference Proceedings (OSTI)

... Corporation on the issues discussed as ... 24 6 OPERATIONAL ENVIRONMENT ..... ... key is EOR'ed with ...

2012-09-07T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

82

UMTRA Project Site Observational Work Plan, Mexican Hat, Utah  

SciTech Connect

Surface cleanup activities at the Mexican Hat UMTRA processing site are nearing completion. Ground Water contamination at the Mexican Hat site is a result of uranium milling operations. The extent of residual process water has been identified, and it is limited to the uppermost aquifer in the vicinity of the site. Deeper aquifers are not affected because of an upward hydraulic gradient and the presence of a confining unit (the deeper aquifers are protected by hydrogeologic isolation). The uppermost unit is returning to its pre-milling, mainly unsaturated state. The unit that contains the contaminated water is not a ground water resource because it qualifies as Class III (limited use) based on limited yield. Ground water in the uppermost unit is currently not used and is not anticipated to be used as a ground water resource. The nearby San Juan River and a converted oil exploration well provide all of the water needs for the area. There are no current threats to human health or livestock; and, because the zone of contamination does not represent a ground water resource, none are anticipated in the future. There are, however, seeps where contaminated water is exposed at land surface. The seeps create potential exposure pathways for plants and wildlife. It is not known at this time if there is a risk to the environment. Additional investigations are needed and are described in this document to confirm the presence or absence of potential environmental risks. Additional hydrogeologic investigations are not required. The proposed ground water compliance strategy for the site is no remediation, because the ground water in the uppermost aquifer (which is also the zone of contamination) qualifies for supplemental standards based on Class III, limited yield, and because there are no threats to human health. Domestic and agricultural water is pumped from a deeper aquifer that is isolated from the contaminated zone.

Not Available

1994-09-01T23:59:59.000Z

83

Intel's Math Kernel Library (MKL) at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Kernel Library (MKL) Kernel Library (MKL) Math Kernel Library (MKL) Description The Intel Math Kernel Library (Intel MKL) contains highly optimized, extensively threaded math routines for science, engineering, and financial applications. Core math functions include BLAS, LAPACK, ScaLAPACK, Sparse Solvers, Fast Fourier Transforms, Vector Math, and more. NERSC provides MKL on the Carver system for all compilers. MKL is available on the Hopper system for Intel compiler only. How to Access MKL on Carver module load mkl How to Use MKL on Carver Linking Your Code with MKL on Carver Basic usage, with (default) PGI compiler: mpif90 my_code.f $MKL Using ScaLAPACK: mpif90 my_code.f $MKL -L$MKL_LIBDIR -lmkl_scalapack_lp64 -lmkl_blacs_openmpi_lp64 Basic usage, with (default) Intel or gcc compilers (after appropriate

84

Indefinite kernel fuzzy c-means clustering algorithms  

Science Conference Proceedings (OSTI)

This paper proposes two types of kernel fuzzy c-means algorithms with an indefinite kernel. Both algorithms are based on the fact that the relational fuzzy c-means algorithm is a special case of the kernel fuzzy c-means algorithm. ... Keywords: indefinite kernel, kernel fuzzy c-means, non-euclidean fuzzy relational clustering, non-euclidean relational fuzzy c-means

Yuchi Kanzawa; Yasunori Endo; Sadaaki Miyamoto

2010-10-01T23:59:59.000Z

85

HAT-P-34b-HAT-P-37b: FOUR TRANSITING PLANETS MORE MASSIVE THAN JUPITER ORBITING MODERATELY BRIGHT STARS  

SciTech Connect

We report the discovery of four transiting extrasolar planets (HAT-P-34b-HAT-P-37b) with masses ranging from 1.05 to 3.33 M{sub J} and periods from 1.33 to 5.45 days. These planets orbit relatively bright F and G dwarf stars (from V = 10.16 to V = 13.2). Of particular interest is HAT-P-34b which is moderately massive (3.33 M{sub J}), has a high eccentricity of e = 0.441 {+-} 0.032 at a period of P = 5.452654 {+-} 0.000016 days, and shows hints of an outer component. The other three planets have properties that are typical of hot Jupiters.

Bakos, G. A.; Hartman, J. D.; Csubry, Z.; Penev, K. [Department of Astrophysical Sciences, Princeton University, Princeton, NJ 08544 (United States); Torres, G.; Beky, B.; Latham, D. W.; Bieryla, A.; Quinn, S.; Szklenar, T.; Esquerdo, G. A.; Noyes, R. W. [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA (United States); Buchhave, L. A. [Niels Bohr Institute, University of Copenhagen, DK-2100, Denmark, and Centre for Star and Planet Formation, Natural History Museum of Denmark, DK-1350 Copenhagen (Denmark); Kovacs, G. [Konkoly Observatory, Budapest (Hungary); Shporer, A. [LCOGT, 6740 Cortona Drive, Santa Barbara, CA (United States); Fischer, D. A. [Astronomy Department, Yale University, New Haven, CT (United States); Johnson, J. A. [California Institute of Technology, Department of Astrophysics, MC 249-17, Pasadena, CA (United States); Howard, A. W.; Marcy, G. W. [Department of Astronomy, University of California, Berkeley, CA (United States); Sato, B., E-mail: gbakos@astro.princeton.edu [Department of Earth and Planetary Sciences, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8551 (Japan); and others

2012-07-15T23:59:59.000Z

86

LightWeight KerneL  

NLE Websites -- All DOE Office Websites (Extended Search)

Catamount n-Way Catamount n-Way LightWeight KerneL 1 R&D 100 Entry Catamount n-Way LightWeight KerneL 2 R&D 100 Entry Submitting organization Sandia National Laboratories PO Box 5800 Albuquerque, NM 87185-1319 USA Ron Brightwell Phone: (505) 844-2099 Fax: (505) 845-7442 rbbrigh@sandia.gov AFFIRMATION: I affirm that all information submitted as a part of, or supplemental to, this entry is a fair and accurate representation of this product. _____________________________ Ron Brightwell Joint entry Operating Systems Research 1527 16th NW #5 Washington, DC 20036 USA Trammell Hudson Phone: (240) 283-1700 Fax: (843) 971-9774 hudson@osresearch.net ProduCt name Catamount N-Way (CNW) Lightweight Kernel brief deSCriPtion CNW is an operating system that exploits existing features of multi-core processors

87

BP Oil Spill Footage (High Def) - Top Hat Procedure at 4850'...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Field Sites Power Marketing Administration Other Agencies You are here Home BP Oil Spill Footage (High Def) - Top Hat Procedure at 4850' - June 3 2010 (4 of 4) BP Oil...

88

Practical Guide to Fedora and Red Hat Enterprise Linux, 5th edition  

Science Conference Proceedings (OSTI)

Master All the Techniques You Need to Succeed with Fedora and Red Hat Enterprise Linux Set up key Internet servers, step by step, including Samba, Apache, sendmail, DNS, FTP, and other Internet servers Automate and streamline administration with this ...

Mark G. Sobell

2010-02-01T23:59:59.000Z

89

Microsoft PowerPoint - Enterprise Top Hat Phases - 07-04-2010...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

from Discoverer Enterprise (DE) Main. When capping operation begins, DE moves to standby position, recovers TH4 and DE LMRP, and then deploys TH10 on DE Main. Top Hat 4 on...

90

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Users Gain Elevated Privileges T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges...

91

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

92

V-072: Red Hat update for java-1.7.0-openjdk | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Red Hat update for java-1.7.0-openjdk 2: Red Hat update for java-1.7.0-openjdk V-072: Red Hat update for java-1.7.0-openjdk January 18, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for java-1.7.0-openjdk. PLATFORM: The vulnerabilities are reported in Red Hat Enterprise Linux 5 and 6 ABSTRACT: Red Hat has issued an update for java-1.7.0-openjdk. REFERENCE LINKS: Secunia Advisory SA51858 RHSA-2013:0165-1 CVE-2012-3174 CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. IMPACT: Two improper permission check issues were discovered in the reflection API in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. SOLUTION: Vendor advises to upgrade to these updated packages, which resolve these

93

Fabrication of Uranium Oxycarbide Kernels for HTR Fuel  

Science Conference Proceedings (OSTI)

Babcock and Wilcox (B&W) has been producing high quality uranium oxycarbide (UCO) kernels for Advanced Gas Reactor (AGR) fuel tests at the Idaho National Laboratory. In 2005, 350-m, 19.7% 235U-enriched UCO kernels were produced for the AGR-1 test fuel. Following coating of these kernels and forming the coated-particles into compacts, this fuel was irradiated in the Advanced Test Reactor (ATR) from December 2006 until November 2009. B&W produced 425-m, 14% enriched UCO kernels in 2008, and these kernels were used to produce fuel for the AGR-2 experiment that was inserted in ATR in 2010. B&W also produced 500-m, 9.6% enriched UO2 kernels for the AGR-2 experiments. Kernels of the same size and enrichment as AGR-1 were also produced for the AGR-3/4 experiment. In addition to fabricating enriched UCO and UO2 kernels, B&W has produced more than 100 kg of natural uranium UCO kernels which are being used in coating development tests. Successive lots of kernels have demonstrated consistent high quality and also allowed for fabrication process improvements. Improvements in kernel forming were made subsequent to AGR-1 kernel production. Following fabrication of AGR-2 kernels, incremental increases in sintering furnace charge size have been demonstrated. Recently small scale sintering tests using a small development furnace equipped with a residual gas analyzer (RGA) has increased understanding of how kernel sintering parameters affect sintered kernel properties. The steps taken to increase throughput and process knowledge have reduced kernel production costs. Studies have been performed of additional modifications toward the goal of increasing capacity of the current fabrication line to use for production of first core fuel for the Next Generation Nuclear Plant (NGNP) and providing a basis for the design of a full scale fuel fabrication facility.

Charles Barnes; CLay Richardson; Scott Nagley; John Hunn; Eric Shaber

2010-10-01T23:59:59.000Z

94

The Daemon Kernel of the Sun  

E-Print Network (OSTI)

The daemon-stimulated proton decay is capable of providing an appreciable part of the Sun luminosity as well as nonelectron flavor component in the solar neutrino flux. This follows (1) from our experiments on detection of negative daemons in Earth-crossing orbits, which give ~1 microsec for the decay time of a daemon-containing proton, and (2) from an estimate of the total number of daemons which could be captured by the Sun from the Galactic disk (up to \\~2.4E30). Because of their huge mass (~3E-5 g), the captured daemons form in the Sun's center a kernel a few cm in size. The protons diffuse into the kernel to decay there with a release of energy. Physically sound estimates of the parameters of the kernel can be obtained if it consists mainly of negative daemons. Proton decay maintains a high temperature of the daemon gas (up to \\~1E11-1E12 K), which makes it physically collisionless and prevents kernel collapse into a black hole.

E. M. Drobyshevski

2002-05-21T23:59:59.000Z

95

Remedial Action Plan for the codisposal and stabilization of the Monument Valley and Mexican Hat uranium mill tailings at Mexican Hat, Utah: Appendices C--E. Final report  

Science Conference Proceedings (OSTI)

This document provides appendices C, D, and E this Remedial Action Plan (RAP) which is a revision of the original Mexican Hat Remedial Action Plan and RAP Modification submitted in July 1988 and January 1989, respectively, along with updated design documents. Appendix C provide the Radiological Support Plan, Appendix D provides the Site Characterization, and Appendix E provides the Water Resources Protection Strategy.

NONE

1993-02-01T23:59:59.000Z

96

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

97

Spark Ignited Turbulent Flame Kernel Growth  

DOE Green Energy (OSTI)

An experimental study of the effects of spark power and of incomplete fuel-air mixing on spark-ignited flame kernel growth was conducted in turbulent propane-air mixtures at 1 atm, 300K conditions. The results showed that increased spark power resulted in an increased growth rate, where the effect of short duration breakdown sparks was found to persist for times of the order of milliseconds. The effectiveness of increased spark power was found to be less at high turbulence and high dilution conditions. Increased spark power had a greater effect on the 0-5 mm burn time than on the 5-13 mm burn time, in part because of the effect of breakdown energy on the initial size of the flame kernel. And finally, when spark power was increased by shortening the spark duration while keeping the effective energy the same there was a significant increase in the misfire rate, however when the spark power was further increased by increasing the breakdown energy the misfire rate dropped to zero. The results also showed that fluctuations in local mixture strength due to incomplete fuel-air mixing cause the flame kernel surface to become wrinkled and distorted; and that the amount of wrinkling increases as the degree of incomplete fuel-air mixing increases. Incomplete fuel-air mixing was also found to result in a significant increase in cyclic variations in the flame kernel growth. The average flame kernel growth rates for the premixed and the incompletely mixed cases were found to be within the experimental uncertainty except for the 33%-RMS-fluctuation case where the growth rate was significantly lower. The premixed and 6%-RMS-fluctuation cases had a 0% misfire rate. The misfire rates were 1% and 2% for the 13%-RMS-fluctuation and 24%-RMS-fluctuation cases, respectively; however, it drastically increased to 23% in the 33%-RMS-fluctuation case.

Santavicca, D.A.

1995-06-01T23:59:59.000Z

98

PERI Auto-tuning Memory Intensive Kernels  

NLE Websites -- All DOE Office Websites (Extended Search)

PERI PERI - Auto-tuning Memory Intensive Kernels for Multicore Samuel Williams † , Kaushik Datta † , Jonathan Carter , Leonid Oliker † , John Shalf , Katherine Yelick † , David Bailey CRD/NERSC, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA † Computer Science Division, University of California at Berkeley, Berkeley, CA 94720, USA E-mail: SWWilliams@lbl.gov, kdatta@eecs.berkeley.edu, JTCarter@lbl.gov, LOliker@lbl.gov, JShalf@lbl.gov, KAYelick@lbl.gov, DHBailey@lbl.gov Abstract. We present an auto-tuning approach to optimize application performance on emerging multicore architectures. The methodology extends the idea of search-based performance optimizations, popular in linear algebra and FFT libraries, to application-specific computational kernels. Our work applies this strategy to Sparse Matrix Vector Multiplication

99

Radiologic characterization of the Mexican Hat, Utah, uranium mill tailings remedial action site: Addendum D1  

Science Conference Proceedings (OSTI)

This radiologic characterization of the inactive uranium millsite at Mexican Hat, Utah, was conducted by Bendix Field Engineering Corporation for the US Department of Energy (DOE), Grand Junctions Project Office in response to and in accord with a Statement of Work prepared by the DOE Uranium Mill Tailings Remedial Action Project (UMTRAP) Technical Assistance Contractor, Jacobs Engineering Group, Inc. The objective of this project was to determine the horizontal and vertical extent of contamination that exceeds the US Environmental Protection Agency (EPA) standards at the Mexican Hat site. The data presented in this report are required for characterization of the areas adjacent to the Mexican Hat tailings piles and for the subsequent design of cleanup activities. Some on- pile sampling was required to determine the depth of the 15-pCi/g Ra- 226 interface in an area where wind and water erosion has taken place.

Ludlam, J.R.

1985-01-01T23:59:59.000Z

100

HATS-1b: THE FIRST TRANSITING PLANET DISCOVERED BY THE HATSouth SURVEY  

Science Conference Proceedings (OSTI)

We report the discovery of HATS-1b, a transiting extrasolar planet orbiting the moderately bright V = 12.05 G dwarf star GSC 6652-00186, and the first planet discovered by HATSouth, a global network of autonomous wide-field telescopes. HATS-1b has a period of P Almost-Equal-To 3.4465 days, mass of M{sub p} Almost-Equal-To 1.86 M{sub J}, and radius of R{sub p} Almost-Equal-To 1.30 R{sub J}. The host star has a mass of 0.99 M{sub Sun} and radius of 1.04 R{sub Sun }. The discovery light curve of HATS-1b has near-continuous coverage over several multi-day timespans, demonstrating the power of using a global network of telescopes to discover transiting planets.

Penev, K.; Bakos, G. A.; Hartman, J. D.; Csubry, Z. [Department of Astrophysical Sciences, Princeton University, NJ 08544 (United States); Bayliss, D.; Zhou, G.; Conroy, P. [Australian National University, Canberra (Australia); Jordan, A.; Suc, V.; Rabus, M.; Brahm, R.; Espinoza, N. [Departamento de Astronomia y Astrofisica, Pontificia Universidad Catolica de Chile, Av. Vicuna Mackenna 4860, 7820436 Macul, Santiago (Chile); Mohler, M.; Mancini, L.; Henning, T.; Nikolov, N.; Csak, B. [Max Planck Institute for Astronomy, Heidelberg (Germany); Beky, B.; Noyes, R. W. [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA (United States); Buchhave, L., E-mail: kpenev@astro.princeton.edu [Niels Bohr Institute, Copenhagen University (Denmark); and others

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Remedial Action Plan for the codisposal and stabilization of the Monument Valley and Mexican Hat uranium mill tailings at Mexican Hat, Utah  

Science Conference Proceedings (OSTI)

This document is a revision of the original Mexiacan Hat Remedial Action Plan (RAP) and RAP Modification submitted in July 1988 and January 1989, respectively, along with updated design documents. This RAP has been developed to serve a two-fold purpose. It presents the activities proposed by the Department of Energy (DOE) to accomplish long-term stabilization and control of the residual radioactive materials (RRM) from Monument Valley, Arizona, and Mexican Hat, Utah, at the Mexican Hat disposal site. It also serves to document the concurrence of both the Navajo Nation and the Nuclear Regulatory Commission (NRC) in the remedial action. This agreement, upon execution by DOE and the Navajo Nation and concurrence by the NRC, becomes Appendix B of the Cooperative Agreement. This document has been structured to provide a comprehensive understanding of the remedial action proposed for the Monument Valley and Mexican Hat sites. It includes specific design and construction requirements for the remedial action. Pertinent information and data are included with reference given to the supporting documents. Section 2.0 presents the EPA standards, including a discussion of their objectives. Section 3. 0 summarizes the present site characteristics and provides a definition of site-specific problems. Section 4.0 is the site design for the proposed action. Section 5.0 presents the water resources protection strategy. Section 6.0 summarizes the plan for ensuring health and safety protection for the surrounding community and the on- site workers. Section 7.0 lists the responsibilities of the project participants. Section 8.0 describes the features of the long-term surveillance and maintenance plan.

NONE

1993-02-01T23:59:59.000Z

102

Red Hat Enterprise Virtualization - KVM-based infrastructure services at BNL  

Science Conference Proceedings (OSTI)

Over the past 18 months, BNL has moved a large percentage of its Linux-based servers and services into a Red Hat Enterprise Virtualization (RHEV) environment. This presentation will address our approach to virtualization, critical decision points, and a discussion of our implementation. Specific topics will include an overview of hardware and software requirements, networking, and storage; discussion of the decision of Red Hat solution over competing products (VMWare, Xen, etc); details on some of the features of RHEV - both current and on their roadmap; Review of performance and reliability gains since deployment completion; path forward for RHEV at BNL and caveats and potential problems.

Cortijo, D.

2011-06-14T23:59:59.000Z

103

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

104

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

105

Efficient semantic kernel-based text classification using matching pursuit KFDA  

Science Conference Proceedings (OSTI)

A number of powerful kernel-based learning machines, such as support vector machines (SVMs), kernel Fisher discriminant analysis (KFDA), have been proposed with competitive performance. However, directly applying existing attractive kernel approaches ... Keywords: efficient text classification, kernel method, matching pursuit KFDA, semantic kernel

Qing Zhang; Jianwu Li; Zhiping Zhang

2011-11-01T23:59:59.000Z

106

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

107

U-175: Linux Kernel KVM Memory Slot Management Flaw  

Energy.gov (U.S. Department of Energy (DOE))

A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system.

108

ARMORY: An automatic security testing tool for buffer overflow defect detection  

Science Conference Proceedings (OSTI)

Program Buffer Overflow Defects (PBODs) are the stepping stones of Buffer Overflow Attacks (BOAs), which are one of the most dangerous security threats to the Internet. In this paper, we propose a kernel-based security testing tool, named ARMORY, for ...

Li-Han Chen, Fu-Hau Hsu, Yanling Hwang, Mu-Chun Su, Wei-Shinn Ku, Chi-Hsuan Chang

2013-10-01T23:59:59.000Z

109

Efficient approximate leave-one-out cross-validation for kernel logistic regression  

Science Conference Proceedings (OSTI)

Kernel logistic regression (KLR) is the kernel learning method best suited to binary pattern recognition problems where estimates of a-posteriori probability of class membership are required. Such problems occur frequently ... Keywords: Kernel logistic regression, Model selection

Gavin C. Cawley; Nicola L. Talbot

2008-06-01T23:59:59.000Z

110

Commute-time convolution kernels for graph clustering  

Science Conference Proceedings (OSTI)

Commute time has proved to be a powerful attribute for clustering and characterising graph structure, and which is easily computed from the Laplacian spectrum. Moreover, commute time is robust to deletions of random edges and noisy edge weights. In this ... Keywords: commute times, convolution kernel, graph kernel, laplacian

Normawati A. Rahman; Edwin R. Hancock

2010-08-01T23:59:59.000Z

111

Fast computation of geometric moments using a symmetric kernel  

Science Conference Proceedings (OSTI)

This paper presents a novel set of geometric moments with symmetric kernel (SGM) obtained using an appropriate transformation of image coordinates. By using this image transformation, the computational complexity of geometric moments (GM) is reduced ... Keywords: Computation, Efficient representation, Fast computation, Geometric moments with symmetric kernel (SGM), Invariant properties, Numerical instability, Symmetrical property, Zernike moments

Chong-Yaw Wee; Raveendran Paramesran; R. Mukundan

2008-07-01T23:59:59.000Z

112

Locking in the multithreaded FreeBSD kernel  

Science Conference Proceedings (OSTI)

About a year ago, the FreeBSD Project embarked on the ambitious task of multithreading its kernel. The primary goal of this project is to improve performance on multiprocessor (MP) systems by allowing concurrent access to the kernel while not drastically ...

John H. Baldwin

2002-02-01T23:59:59.000Z

113

Induction of robust classifiers for web ontologies through kernel machines  

Science Conference Proceedings (OSTI)

The paper focuses on the task of approximate classification of semantically annotated individual resources in ontological knowledge bases. The method is based on classification models built through kernel methods, a well-known class of effective statistical ... Keywords: Individual classification, Inductive reasoning, Kernel methods, Ontology mining, Similarity, Support vector machines

Nicola Fanizzi; Claudia d'Amato; Floriana Esposito

2012-03-01T23:59:59.000Z

114

Training of support vector machines with Mahalanobis kernels  

Science Conference Proceedings (OSTI)

Radial basis function (RBF) kernels are widely used for support vector machines. But for model selection, we need to optimize the kernel parameter and the margin parameter by time-consuming cross validation. To solve this problem, in this paper we propose ...

Shigeo Abe

2005-09-01T23:59:59.000Z

115

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

116

HAT-P-18b and HAT-P-19b: Two Low-Density Saturn-Mass Planets Transiting Metal-Rich K Stars  

E-Print Network (OSTI)

We report the discovery of two new transiting extrasolar planets. HAT-P-18b orbits the V=12.759 K2 dwarf star GSC 2594-00646, with a period P=5.508023+-0.000006 d, transit epoch Tc=2454715.02174+-0.00020 (BJD), and transit duration 0.1131+-0.0009 d. The host star has a mass of 0.77+-0.03 Msun, radius of 0.75+-0.04 Rsun, effective temperature 4803+-80 K, and metallicity [Fe/H]=+0.10+-0.08. The planetary companion has a mass of 0.197+-0.013 Mjup, and radius of 0.995+-0.052 Rjup yielding a mean density of 0.25+-0.04 g cm-3. HAT-P-19b orbits the V=12.901 K1 dwarf star GSC 2283-00589, with a period P=4.008778+-0.000006 d, transit epoch Tc=2455091.53417+-0.00034 (BJD), and transit duration 0.1182+-0.0014 d. The host star has a mass of 0.84+-0.04 Msun, radius of 0.82+-0.05 Rsun, effective temperature 4990+-130 K, and metallicity [Fe/H]=+0.23+-0.08. The planetary companion has a mass of 0.292+-0.018 Mjup, and radius of 1.132+-0.072 Rjup yielding a mean density of 0.25+-0.04 g cm-3. The radial velocity residuals for H...

Hartman, J D; Sato, B; Torres, G; Noyes, R W; Latham, D W; Kovcs, G; Fischer, D A; Howard, A W; Johnson, J A; Marcy, G W; Buchhave, L A; Fresz, G; Perumpilly, G; Bky, B; Stefanik, R P; Sasselov, D D; Esquerdo, G A; Everett, M; Csubry, Z; Lzr, J; Papp, I; Sri, P

2010-01-01T23:59:59.000Z

117

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

118

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

119

High multiplicity processes at NLO with BlackHat and Sherpa  

E-Print Network (OSTI)

In this contribution we review recent progress with fixed-order QCD predictions for the production of a vector boson in association with jets at hadron colliders, using the programs BlackHat and SHERPA. We review general features of next-to-leading-order (NLO) predictions for the production of a massive vector boson in association with four jets. We also discuss how precise descriptions of vector-boson production can be applied to the determination of backgrounds to new physics signals. Here we focus on data-driven backgrounds to a missing-energy-plus-jets search performed by CMS. Finally, we review recent progress in developing theoretical tools for high-multiplicity loop-computation within the BlackHat-library. In particular, we discuss methods for handling the color degrees of freedom in multi-jet predictions at NLO.

Bern, Zvi; Dixon, Lance J; Hoeche, Stefan; Cordero, Fernando Febres; Ita, Harald; Kosower, David; Matre, Daniel

2012-01-01T23:59:59.000Z

120

HATS: Field Observations to Obtain Spatially Filtered Turbulence Fields from Crosswind Arrays of Sonic Anemometers in the Atmospheric Surface Layer  

Science Conference Proceedings (OSTI)

The Horizontal Array Turbulence Study (HATS) field program utilized horizontal, crosswind arrays of sonic anemometers to calculate estimates of spatially filtered and subfilter-scale (SFS) turbulence, corresponding to its partitioning in large-...

T. W. Horst; J. Kleissl; D. H. Lenschow; C. Meneveau; C.-H. Moeng; M. B. Parlange; P. P. Sullivan; J. C. Weil

2004-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

122

A novel ant-based clustering algorithm using the kernel method  

Science Conference Proceedings (OSTI)

A novel ant-based clustering algorithm integrated with the kernel (ACK) method is proposed. There are two aspects to the integration. First, kernel principal component analysis (KPCA) is applied to modify the random projection of objects when the algorithm ... Keywords: Ant-based clustering, Kernel, Kernel principal component analysis, Swarm intelligence

Lei Zhang; Qixin Cao

2011-10-01T23:59:59.000Z

123

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

124

The Diffusion Kernel Filter Applied to Lagrangian Data Assimilation  

Science Conference Proceedings (OSTI)

The diffusion kernel filter is a sequential particle-method approach to data assimilation of time series data and evolutionary models. The method is applicable to nonlinear/non-Gaussian problems. Within branches of prediction it parameterizes ...

Paul Krause; Juan M. Restrepo

2009-12-01T23:59:59.000Z

125

A CCA-compliant nuclear power plant simulator kernel  

Science Conference Proceedings (OSTI)

This paper presents a parallel, component-oriented nuclear power plant simulator kernel. It is based on the high-performance computing oriented Common Component Architecture. The approach takes advantage of both the component paradigm and the parallel ...

Manuel Daz; Daniel Garrido; Sergio Romero; Bartolom Rubio; Enrique Soler; Jos M. Troya

2005-05-01T23:59:59.000Z

126

A linux kernel cryptographic framework: decoupling cryptographic keys from applications  

Science Conference Proceedings (OSTI)

This paper describes a cryptographic service framework for the Linux kernel. The framework enables user-space applications to perform operations with cryptographic keys, while at the same time ensuring that applications cannot directly access or extract ...

Nikos Mavrogiannopoulos; Miloslav Trma?; Bart Preneel

2012-03-01T23:59:59.000Z

127

Green's kernels for transmission problems in bodies with small inclusions  

E-Print Network (OSTI)

The uniform asymptotic approximation of Green's kernel for the transmission problem of antiplane shear is obtained for domains with small inclusions. The remainder estimates are provided. Numerical simulations are presented to illustrate the effectiveness of the approach.

Vladimir Maz'ya; Alexander Movchan; Michael Nieves

2010-05-24T23:59:59.000Z

128

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

129

Capacities associated with scalar signed Riesz kernels, and analytic capacity  

E-Print Network (OSTI)

The real and imaginari parts of the Cauchy kernel in the plane are scalar Riesz kernels of homogeneity -1. One can associate with each of them a natural notion of capacity related to bounded potentials. The main result of the paper asserts that these capacities are comparable to classical analytic capacity, thus stressing the real variables nature of analytic capacity. Higher dimensional versions of this result are also considered.

Mateu, Joan; Verdera, Joan

2010-01-01T23:59:59.000Z

130

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

131

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

132

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

133

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

134

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

135

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

136

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

137

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

138

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

139

Cold-moderator scattering kernel methods  

SciTech Connect

An accurate representation of the scattering of neutrons by the materials used to build cold sources at neutron scattering facilities is important for the initial design and optimization of a cold source, and for the analysis of experimental results obtained using the cold source. In practice, this requires a good representation of the physics of scattering from the material, a method to convert this into observable quantities (such as scattering cross sections), and a method to use the results in a neutron transport code (such as the MCNP Monte Carlo code). At Los Alamos, the authors have been developing these capabilities over the last ten years. The final set of cold-moderator evaluations, together with evaluations for conventional moderator materials, was released in 1994. These materials have been processed into MCNP data files using the NJOY Nuclear Data Processing System. Over the course of this work, they were able to develop a new module for NJOY called LEAPR based on the LEAP + ADDELT code from the UK as modified by D.J. Picton for cold-moderator calculations. Much of the physics for methane came from Picton`s work. The liquid hydrogen work was originally based on a code using the Young-Koppel approach that went through a number of hands in Europe (including Rolf Neef and Guy Robert). It was generalized and extended for LEAPR, and depends strongly on work by Keinert and Sax of the University of Stuttgart. Thus, their collection of cold-moderator scattering kernels is truly an international effort, and they are glad to be able to return the enhanced evaluations and processing techniques to the international community. In this paper, they give sections on the major cold moderator materials (namely, solid methane, liquid methane, and liquid hydrogen) using each section to introduce the relevant physics for that material and to show typical results.

MacFarlane, R.E.

1998-08-01T23:59:59.000Z

140

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel SFC Driver TCP MSS Option Handling Denial of 6: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability August 2, 2012 - 7:00am Addthis PROBLEM: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability PLATFORM: Linux Kernel 3.2.x ABSTRACT: The Linux kernel is prone to a remote denial-of-service vulnerability. reference LINKS: Secunia Advisory SA50081 Bugtraq ID: 54763 Vulnerability Report: Linux Kernel 3.2.x The Linux Kernel Archives Original Advisory CVE-2012-3412 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the Solarflare network

142

HAT-P-30b: A TRANSITING HOT JUPITER ON A HIGHLY OBLIQUE ORBIT  

Science Conference Proceedings (OSTI)

We report the discovery of HAT-P-30b, a transiting exoplanet orbiting the V = 10.419 dwarf star GSC 0208-00722. The planet has a period P = 2.810595 {+-} 0.000005 days, transit epoch T{sub c} = 2455456.46561 {+-} 0.00037 (BJD), and transit duration 0.0887 {+-} 0.0015 days. The host star has a mass of 1.24 {+-} 0.04 M{sub sun}, radius of 1.21 {+-} 0.05 R{sub sun}, effective temperature of 6304 {+-} 88 K, and metallicity [Fe/H] = +0.13 {+-} 0.08. The planetary companion has a mass of 0.711 {+-} 0.028 M{sub J} and radius of 1.340 {+-} 0.065 R{sub J} yielding a mean density of 0.37 {+-} 0.05 g cm{sup -3}. We also present radial velocity measurements that were obtained throughout a transit that exhibit the Rossiter-McLaughlin effect. By modeling this effect, we measure an angle of {lambda} = 73.{sup 0}5 {+-} 9.{sup 0}0 between the sky projections of the planet's orbit normal and the star's spin axis. HAT-P-30b represents another example of a close-in planet on a highly tilted orbit, and conforms to the previously noted pattern that tilted orbits are more common around stars with T{sub eff*} {approx}> 6250 K.

Johnson, John Asher; Morton, T. D. [California Institute of Technology, Department of Astrophysics, MC 249-17, Pasadena, CA 91125 (United States); Winn, J. N. [Department of Physics, and Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Bakos, G. A.; Hartman, J. D.; Torres, G.; Latham, D. W.; Noyes, R. W.; Esquerdo, G. A.; Furesz, G.; Quinn, S. N.; Beky, B.; Sasselov, D. D.; Stefanik, R. P. [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA (United States); Kovacs, Geza [Konkoly Observatory, Budapest (Hungary); Sato, B. [Department of Earth and Planetary Sciences, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8551 (Japan); Fischer, D. A. [Department of Astronomy, Yale University, New Haven, CT (United States); Marcy, G. W.; Howard, A. W. [Department of Astronomy, University of California, Berkeley, CA (United States); Buchhave, L. A., E-mail: gbakos@cfa.harvard.edu [Niels Bohr Institute, Copenhagen University, DK-2100 Copenhagen (Denmark)

2011-07-01T23:59:59.000Z

143

THE OBLIQUE ORBIT OF THE SUPER-NEPTUNE HAT-P-11b  

SciTech Connect

We find the orbit of the Neptune-sized exoplanet HAT-P-11b to be highly inclined relative to the equatorial plane of its host star. This conclusion is based on spectroscopic observations of two transits, which allowed the Rossiter-McLaughlin effect to be detected with an amplitude of 1.5 m s{sup -1}. The sky-projected obliquity is 103{sup +26} {sub -10} deg. This is the smallest exoplanet for which spin-orbit alignment has been measured. The result favors a migration scenario involving few-body interactions followed by tidal dissipation. This finding also conforms with the pattern that the systems with the weakest tidal interactions have the widest spread in obliquities. We predict that the high obliquity of HAT-P-11 will be manifest in transit light curves from the Kepler spacecraft: starspot-crossing anomalies will recur at most once per stellar rotation period, rather than once per orbital period as they would for a well-aligned system.

Winn, Joshua N.; Albrecht, Simon [Department of Physics, and Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Johnson, John Asher [Department of Astrophysics, and NASA Exoplanet Science Institute, California Institute of Technology, MC 249-17, Pasadena, CA 91125 (United States); Howard, Andrew W. [Department of Astronomy, University of California, Mail Code 3411, Berkeley, CA 94720 (United States); Marcy, Geoffrey W.; Isaacson, Howard [Space Sciences Laboratory, University of California, Berkeley, CA 94720 (United States); Shporer, Avi [Las Cumbres Observatory Global Telescope Network, 6740 Cortona Drive, Suite 102, Santa Barbara, CA 93117 (United States); Bakos, Gaspar A.; Hartman, Joel D. [Harvard-Smithsonian Center for Astrophysics, 60 Garden St., Cambridge, MA 02138 (United States)

2010-11-10T23:59:59.000Z

144

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

145

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

146

Using gprof to Tune the 4.2BSD Kernel  

E-Print Network (OSTI)

This paper describes how the gprof profiler accounts for the running time of called routines in the running time of the routines that call them. It then explains how to configure a profiling kernel on the 4.2 Berkeley Software Distribution of UNIX for the VAX and discusses tradeoffs in techniques for collecting profile data. Gprof identifies problems that severely affects the overall performance of the kernel. Once a potential problem areas is identified benchmark programs are devised to highlight the bottleneck. These benchmarks verify that the problem exist and provide a metric against which to validate proposed solutions. Tw o caches are added to the kernel to alleviate the bottleneck and gprof is used to validates their effectiveness. VAX is a trademark of Digital Equipment Corporation.

Marshall Kirk Mckusick

1984-01-01T23:59:59.000Z

147

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

148

T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local 583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information March 18, 2011 - 5:15pm Addthis PROBLEM: A vulnerability was reported in the Linux Kernel. A local user can obtain information from kernel memory. PLATFORM: Version(s): 2.4.x, 2.6.x ABSTRACT: A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space. reference LINKS: http://www.securitytracker.com/id/1025225 CVE-2011-1163 http://www.kernel.org/ IMPACT ASSESSMENT: Moderate Discussion: A local user can create a storage device with specially crafted OSF

149

Kernel Auto-Regressive Model with eXogenous Inputs for Nonlinear Time Series Prediction  

Science Conference Proceedings (OSTI)

In this paper we present a novel approach for nonlinear time series prediction using Kernel methods. The kernel methods such as Support Vector Machine(SVM) and Support Vector Regression(SVR) deal with nonlinear problems assuming independent and identically ...

Venkataramana B. Kini; C. Chandra Sekhar

2007-03-01T23:59:59.000Z

150

Modeling the Distribution of Precipitation Forecasts from the Canadian Ensemble Prediction System Using Kernel Density Estimation  

Science Conference Proceedings (OSTI)

Kernel density estimation is employed to fit smooth probabilistic models to precipitation forecasts of the Canadian ensemble prediction system. An intuitive nonparametric technique, kernel density estimation has become a powerful tool widely used ...

Syd Peel; Laurence J. Wilson

2008-08-01T23:59:59.000Z

151

Dataflow-driven GPU performance projection for multi-kernel transformations  

Science Conference Proceedings (OSTI)

Applications often have a sequence of parallel operations to be offloaded to graphics processors; each operation can become an individual GPU kernel. Developers typically explore a variety of transformations for each kernel. Furthermore, it is well known ...

Jiayuan Meng; Vitali A. Morozov; Venkatram Vishwanath; Kalyan Kumaran

2012-11-01T23:59:59.000Z

152

U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2, 2012 - 7:00am Addthis PROBLEM: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability PLATFORM: Linux Kernel 3.2.x ABSTRACT: The Linux...

153

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

154

DOE - Office of Legacy Management -- Mexican Hat AEC Ore Buying Station -  

NLE Websites -- All DOE Office Websites (Extended Search)

AEC Ore Buying Station AEC Ore Buying Station - UT 0-02 FUSRAP Considered Sites Site: Mexican Hat AEC Ore Buying Station (UT.0-02) Designated Name: Alternate Name: Location: Evaluation Year: Site Operations: Site Disposition: Radioactive Materials Handled: Primary Radioactive Materials Handled: Radiological Survey(s): Site Status: The history of domestic uranium procurement under U.S. Atomic Energy Commission (AEC) contracts identifies a number of ore buying stations (sampling and storage sites) that were operated during the period late-1949 through the mid-1960s. During this period the AEC established ore-buying stations in new uranium producing areas where it appeared that ore production would be sufficient to support a uranium milling operation. The ideal scenario was to accumulate a sufficient stockpile of ore and

155

Assessment of the radiological impact of the inactive uranium-mill tailings at Mexican Hat, Utah  

SciTech Connect

High surface soil concentrations of /sup 226/Ra and high above-ground measurements of gamma-ray intensity in the vicinity of the inactive uranium-mill tailings at Mexican Hat show both wind and water erosion of the tailings. The former mill area, occupied by a trade school at the time of this survey, shows a comparatively high level of contamination, probably from unprocessed ore on the surface of the ore storage area near the location of the former mill buildings. However, the estimated health effect of exposure to gamma rays during a 2000-hr work year in the area represents an increase of 0.1% in the risk of death from cancer. Exposure of less than 600 persons within 1.6 km of the tailings to radon daughters results in an estimated 0.2%/year increase in risk of lung cancer.

Haywood, F.F.; Goldsmith, W.A.; Ellis, B.S.; Hubbard, H.M. Jr.; Fox, W.F.; Shinpaugh, W.H.

1980-03-01T23:59:59.000Z

156

Regression based D-optimality experimental design for sparse kernel density estimation  

Science Conference Proceedings (OSTI)

This paper derives an efficient algorithm for constructing sparse kernel density (SKD) estimates. The algorithm first selects a very small subset of significant kernels using an orthogonal forward regression (OFR) procedure based on the D-optimality ... Keywords: D-optimality, Optimal experimental design, Orthogonal forward regression, Parzen window estimate, Probability density function, Sparse kernel modelling

S. Chen; X. Hong; C. J. Harris

2010-01-01T23:59:59.000Z

157

Noise-robust edge detector combining isotropic and anisotropic Gaussian kernels  

Science Conference Proceedings (OSTI)

A new noise-robust edge detector is proposed, which combines a small-scaled isotropic Gaussian kernel and large-scaled anisotropic Gaussian kernels (ANGKs) to obtain edge maps of images. Its main advantage is that noise reduction is attained while maintaining ... Keywords: Anisotropic Gaussian kernels (ANGKs), Anisotropic directional derivatives, Edge detection, Edge resolution, Edge stretch effect

Peng-Lang Shui; Wei-Chuan Zhang

2012-02-01T23:59:59.000Z

158

Feasibility of impact-acoustic emissions for detection of damaged wheat kernels  

Science Conference Proceedings (OSTI)

A non-destructive, real time device was developed to detect insect damage, sprout damage, and scab damage in kernels of wheat. Kernels are impacted onto a steel plate and the resulting acoustic signal analyzed to detect damage. The acoustic signal was ... Keywords: Acoustic emissions, Insect damage kernels, Neural network, Sorting, Spectral analysis

Tom C. Pearson; A. Enis Cetin; Ahmed H. Tewfik; Ron P. Haff

2007-05-01T23:59:59.000Z

159

Computer vision algorithm for barley kernel identification, orientation estimation and surface structure assessment  

Science Conference Proceedings (OSTI)

This paper presents an algorithm for analyzing barley kernel images to evaluate cereal grain quality and perform grain classification. The input data comprised digital images of kernels obtained from an optical scanner. The algorithm identified individual ... Keywords: Automated kernel grading, Cereal grain classification, Digital image analysis

Piotr M. Szczypi?Ski; Piotr Zapotoczny

2012-09-01T23:59:59.000Z

160

A Bayesian approach to bandwidth selection for multivariate kernel density estimation  

Science Conference Proceedings (OSTI)

Kernel density estimation for multivariate data is an important technique that has a wide range of applications. However, it has received significantly less attention than its univariate counterpart. The lower level of interest in multivariate kernel ... Keywords: Cross-validation, Kullback-Leibler information, Mean integrated squared errors, Monte Carlo kernel likelihood, Sampling algorithms

Xibin Zhang; Maxwell L. King; Rob J. Hyndman

2006-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

On the kernelization of ranking r-CSP in tournaments  

E-Print Network (OSTI)

A Ranking r-Constraint Satisfaction Problem (ranking r-CSP) consists of a ground set of vertices V, an arity r > 2, a parameter k and a constraint system c, where c is a function which maps rankings of r-sized subsets of V to {0,1}. The objective is to decide if there exists a ranking ? of the vertices satisfying all but at most k constraints. Famous ranking r-CSP include the Feedback Arc Set in Tournaments and Betweenness in Tournaments problems. We consider these problems from the kernelization viewpoint. We first prove that Feedback Arc Set in Bipartite Tournaments admits a kernel with O(k^2) vertices, improving the previous bound of O(k^3) vertices. Next, we prove that so-called l_r-simply characterized ranking r-CSP admit linear vertex-kernels whenever they admit constant-factor approximation algorithms. This implies that r-Betweenness in Tournaments and r-Transitive Feedback Arc Set In Tournaments admit linear vertex-kernels. Finally, we consider another generalization of Feedback Arc Set in Tournaments...

Perez, Anthony

2012-01-01T23:59:59.000Z

162

Optical transformation from chirplet to fractional Fourier transformation kernel  

E-Print Network (OSTI)

We find a new integration transformation which can convert a chirplet function to fractional Fourier transformation kernel, this new transformation is invertible and obeys Parseval theorem. Under this transformation a new relationship between a phase space function and its Weyl-Wigner quantum correspondence operator is revealed.

Hong-yi Fan; Li-yun Hu

2009-02-11T23:59:59.000Z

163

Optical transformation from chirplet to fractional Fourier transformation kernel  

E-Print Network (OSTI)

We find a new integration transformation which can convert a chirplet function to fractional Fourier transformation kernel, this new transformation is invertible and obeys Parseval theorem. Under this transformation a new relationship between a phase space function and its Weyl-Wigner quantum correspondence operator is revealed.

Fan, Hong-yi

2009-01-01T23:59:59.000Z

164

Maximum a posteriori based kernel classifier trained by linear programming  

Science Conference Proceedings (OSTI)

We propose a new approach for classification problem based on the maximum a posteriori (MAP) estimation. The necessary and sufficient condition for the cost function to estimate a posteriori probability was obtained. It was clarified by the condition ... Keywords: cost function, kernel function, linear programming, maximum a posteriori

Nopriadi Nopriadi; Yukihiko Yamashita

2010-08-01T23:59:59.000Z

165

Efficient and effective automated surveillance agents using kernel tricks  

Science Conference Proceedings (OSTI)

Many schemes have been presented over the years to develop automated visual surveillance systems. However, these schemes typically need custom equipment, or involve significant complexity and storage requirements. In this paper we present three software-based ... Keywords: agent, automated, camera, intrusion, kernel, surveillance

Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, Al-Sakib Khan Pathan

2013-05-01T23:59:59.000Z

166

Dead or Alive: finding zombie features in the Linux kernel  

Science Conference Proceedings (OSTI)

Variability management in operating systems is an error-prone and tedious task. This is especially true for the Linux operating system, which provides a specialized tool called Kconfig for users to customize kernels from an impressive amount of ... Keywords: Linux, features, language, preprocessor, software product lines, tool support

Reinhard Tartler; Julio Sincero; Wolfgang Schrder-Preikschat; Daniel Lohmann

2009-10-01T23:59:59.000Z

167

Multiclass Kernel-Imbedded Gaussian Processes for Microarray Data Analysis  

Science Conference Proceedings (OSTI)

Identifying significant differentially expressed genes of a disease can help understand the disease at the genomic level. A hierarchical statistical model named multiclass kernel-imbedded Gaussian process (mKIGP) is developed under a Bayesian framework ... Keywords: Gene expression, Gaussian processes, Monte Carlo methods, nonlinear multiclass systems.

Xin Zhao; Leo Wang-Kit Cheung

2011-07-01T23:59:59.000Z

168

A dynamic aspect-oriented system for OS kernels  

Science Conference Proceedings (OSTI)

We propose a dynamic aspect-oriented system for operating system (OS) kernels written in the C language. Unlike other similar systems, our system named KLASY allows the users to pointcut not only function calls but also member accesses to structures. ... Keywords: Linux, aspect-oriented programming, dynamic AOP, operating system, profiling and debugging

Yoshisato Yanagisawa; Kenichi Kourai; Shigeru Chiba

2006-10-01T23:59:59.000Z

169

Generalized holomorphic Szeg kernel in 3D spheroids  

Science Conference Proceedings (OSTI)

Monogenic orthogonal polynomials over 3D prolate spheroids were previously introduced and shown to have some remarkable properties. In particular, the underlying functions take values in the quaternions (identified with R^4), and are generally assumed ... Keywords: Chebyshev polynomials, Ferrer's associated Legendre functions, Hyperbolic functions, Prolate spheroidal monogenics, Quaternion analysis, Szeg kernel function

J. Morais; K. I. Kou; W. SprIg

2013-02-01T23:59:59.000Z

170

Kernel principal component analysis for stochastic input model generation  

Science Conference Proceedings (OSTI)

Stochastic analysis of random heterogeneous media provides useful information only if realistic input models of the material property variations are used. These input models are often constructed from a set of experimental samples of the underlying random ... Keywords: Data-driven models, Flow in random porous media, Kernel principal component analysis, Non-linear model reduction, Stochastic partial differential equations

Xiang Ma; Nicholas Zabaras

2011-08-01T23:59:59.000Z

171

Measurement Denoising Using Kernel Adaptive Filters in the Smart Grid  

E-Print Network (OSTI)

Measurement Denoising Using Kernel Adaptive Filters in the Smart Grid Zhe Chen and Robert C. Qiu@ieee.org, rqiu@tntech.edu Abstract--State estimation plays an important role in the smart grid. Conventionally, noisy measurements are directly used for state estimation. Today, in the context of the smart grid

Qiu, Robert Caiming

172

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

173

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

174

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

175

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

176

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

177

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

178

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

179

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

180

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

182

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

183

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

184

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

185

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

186

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

187

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

188

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

189

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

190

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

191

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

192

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

193

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

194

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

195

A Security Enforcement Kernel for OpenFlow Networks Phillip Porras  

E-Print Network (OSTI)

on the NOx concentration (equation (12.5)). One might hope under these conditions that a reduction in NOx reduction of NOx emissions. Detailed models for the United States predict that a 50% reduction of NOx presently for 50% of global NOx emissions (section 11.4), and one might be concerned that reduction

Gu, Guofei

196

KEPLER AND GROUND-BASED TRANSITS OF THE EXO-NEPTUNE HAT-P-11b  

SciTech Connect

We analyze 26 archival Kepler transits of the exo-Neptune HAT-P-11b, supplemented by ground-based transits observed in the blue (B band) and near-IR (J band). Both the planet and host star are smaller than previously believed; our analysis yields R{sub p} = 4.31 R{sub +} {+-} 0.06 R{sub +} and R{sub s} = 0.683 R{sub sun} {+-} 0.009 R{sub sun}, both about 3{sigma} smaller than the discovery values. Our ground-based transit data at wavelengths bracketing the Kepler bandpass serve to check the wavelength dependence of stellar limb darkening, and the J-band transit provides a precise and independent constraint on the transit duration. Both the limb darkening and transit duration from our ground-based data are consistent with the new Kepler values for the system parameters. Our smaller radius for the planet implies that its gaseous envelope can be less extensive than previously believed, being very similar to the H-He envelope of GJ 436b and Kepler-4b. HAT-P-11 is an active star, and signatures of star spot crossings are ubiquitous in the Kepler transit data. We develop and apply a methodology to correct the planetary radius for the presence of both crossed and uncrossed star spots. Star spot crossings are concentrated at phases -0.002 and +0.006. This is consistent with inferences from Rossiter-McLaughlin measurements that the planet transits nearly perpendicular to the stellar equator. We identify the dominant phases of star spot crossings with active latitudes on the star, and infer that the stellar rotational pole is inclined at about 12{sup 0} {+-} 5{sup 0} to the plane of the sky. We point out that precise transit measurements over long durations could in principle allow us to construct a stellar Butterfly diagram to probe the cyclic evolution of magnetic activity on this active K-dwarf star.

Deming, Drake; Jackson, Brian; Jennings, Donald E. [Planetary Systems Laboratory, NASA's Goddard Space Flight Center, Greenbelt MD 20771 (United States); Sada, Pedro V. [Departamento de Fisica y Matematicas, Universidad de Monterrey, Monterrey (Mexico); Peterson, Steven W.; Haase, Flynn; Bays, Kevin [Kitt Peak National Observatory, National Optical Astronomy Observatory, Tucson, AZ 85719 (United States); Agol, Eric [Department of Astronomy, University of Washington, Seattle, WA 98195 (United States); Knutson, Heather A., E-mail: ddeming@astro.umd.edu [Department of Astronomy, University of California at Berkeley, Berkeley, CA 94720-3411 (United States)

2011-10-10T23:59:59.000Z

197

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

198

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

199

STARSPOTS, SPIN-ORBIT MISALIGNMENT, AND ACTIVE LATITUDES IN THE HAT-P-11 EXOPLANETARY SYSTEM  

Science Conference Proceedings (OSTI)

We present the analysis of four months of Kepler photometry of the K4V star HAT-P-11, including 26 transits of its 'super-Neptune' planet. The transit data exhibit numerous anomalies which we interpret as passages of the planet over dark starspots. These spot-crossing anomalies preferentially occur at two specific phases of the transit. These phases can be understood as the intersection points between the transit chord and the active latitudes of the host star, where starspots are most abundant. Based on the measured characteristics of spot-crossing anomalies and previous observations of the Rossiter-McLaughlin effect, we find two solutions for the stellar obliquity {psi} and active latitude l: either {psi} = 106{sup +15}{sub -11} and l = 19.7{sup +1.5}{sub -2.2}, or {psi} = 97{sup +8}{sub -4} and l = 67{sup +2}{sub -4} (all in degrees). If the active latitude changes with time analogous to the 'butterfly diagram' of the Sun's activity cycle, future observations should reveal changes in the preferred phases of spot-crossing anomalies.

Sanchis-Ojeda, Roberto; Winn, Joshua N. [Department of Physics and Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States)

2011-12-10T23:59:59.000Z

200

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

202

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

203

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

204

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

205

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21 - 20030 of 28,905 results. 21 - 20030 of 28,905 results. Article T-700:Red Hat: kernel security, bug fix, and enhancement update Red Hat: kernel security, bug fix, and enhancement update. http://energy.gov/cio/articles/t-700red-hat-kernel-security-bug-fix-and-enhancement-update Download TBU-0045- In the Matter of William Cor William Cor (the complainant or the employee), appeals the dismissal of his complaint of retaliation filed under 10 C.F.R. Part 708, the Department of Energy (DOE) Contractor Employee Protection... http://energy.gov/oha/downloads/tbu-0045-matter-william-cor Download FIA-13-0009- In the Matter of Sierra Club On March 18, 2013, the Department of Energy's (DOE) Office of Hearings and Appeals (OHA) denied a Freedom of Information Act (FOIA) Appeal filed by the Sierra Club (Appellant) of a determination...

206

Produkte von a#nen Variet aten. Proposition 2.3.9. Das Tensorprodukt von RAlgebren hat folgende Eigenschaften  

E-Print Network (OSTI)

Produkte von a#nen Variet? aten. Proposition 2.3.9. Das Tensorprodukt von R­Algebren hat folgende Eigenschaften: (a) R# R R ## = R ## . (b) R ## R R ## # -# R ### R R # , x# y ## y# x ist ein Isomorphismus von R­Algebren. (c) R[x 1 , . . . , x n ]# R R ## = R ## [x 1 , . . . , x n ]. (d) Ist I # R # ein Ideal

Hartl, Urs

207

Produkte von affinen Varietaten. Proposition 2.3.9. Das Tensorprodukt von R-Algebren hat folgende Eigenschaften  

E-Print Network (OSTI)

Produkte von affinen Variet¨aten. Proposition 2.3.9. Das Tensorprodukt von R-Algebren hat folgende Eigenschaften: (a) R R R = R . (b) R R R - R R R , x y y x ist ein Isomorphismus von R-Algebren. (c) R[x1, . . . , xn] R R = R [x1, . . . , xn]. (d) Ist I R ein Ideal, so ist (R /I) R R = (R R R )/I·(R R R ). (e

Hartl, Urs

208

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

209

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

210

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

211

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

212

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

213

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

214

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

215

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

216

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

217

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

218

Kernel-Correlated Levy Field Driven Forward Rate and Application to Derivative Pricing  

SciTech Connect

We propose a term structure of forward rates driven by a kernel-correlated Levy random field under the HJM framework. The kernel-correlated Levy random field is composed of a kernel-correlated Gaussian random field and a centered Poisson random measure. We shall give a criterion to preclude arbitrage under the risk-neutral pricing measure. As applications, an interest rate derivative with general payoff functional is priced under this pricing measure.

Bo Lijun [Xidian University, Department of Mathematics (China); Wang Yongjin [Nankai University, School of Business (China); Yang Xuewei, E-mail: xwyangnk@yahoo.com.cn [Nanjing University, School of Management and Engineering (China)

2013-08-01T23:59:59.000Z

219

Heat Kernel Short-Time Expansion within the Scope of Feynman-Kac Formula  

Science Conference Proceedings (OSTI)

The paper gives an outlook of the stochastic approach to derivation of heat kernel short-time asymptotic expansion and to effective evaluation of corresponding coefficients.

Stepin, S. A.; Rejrat, A. J. [Institute of Mathematics, University of Bialystok, Akademicka 2, 15-267 Bialystok (Poland)

2010-11-25T23:59:59.000Z

220

An Object-Oriented Nano-Kernel for Operating System Hardware Support  

Science Conference Proceedings (OSTI)

Abstract: The nano-kernel in the /spl mu/Choices operating system provides hardware support for the operating system. The nano-kernel is a single, modular subsystem that encapsulates the hardware and presents an idealized machine architecture to the ... Keywords: /spl mu/Choices operating system hardware support, UNIX, Unix, abstract classes, hardware encapsulation, higher level abstractions, idealized machine architecture, interface, object-oriented methods, object-oriented nano-kernel, object-oriented programming, operating system kernels, policy, portable design, process paradigms, single modular subsystem, software portability, virtual memory

D. K. Raila

1995-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

222

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

223

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

224

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

225

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

226

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

227

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

228

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

229

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

230

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

231

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

232

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

233

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

234

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

235

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

236

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

237

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

238

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

239

TORCH Computational Reference Kernels - A Testbed for Computer Science Research  

Science Conference Proceedings (OSTI)

For decades, computer scientists have sought guidance on how to evolve architectures, languages, and programming models in order to improve application performance, efficiency, and productivity. Unfortunately, without overarching advice about future directions in these areas, individual guidance is inferred from the existing software/hardware ecosystem, and each discipline often conducts their research independently assuming all other technologies remain fixed. In today's rapidly evolving world of on-chip parallelism, isolated and iterative improvements to performance may miss superior solutions in the same way gradient descent optimization techniques may get stuck in local minima. To combat this, we present TORCH: A Testbed for Optimization ResearCH. These computational reference kernels define the core problems of interest in scientific computing without mandating a specific language, algorithm, programming model, or implementation. To compliment the kernel (problem) definitions, we provide a set of algorithmically-expressed verification tests that can be used to verify a hardware/software co-designed solution produces an acceptable answer. Finally, to provide some illumination as to how researchers have implemented solutions to these problems in the past, we provide a set of reference implementations in C and MATLAB.

Kaiser, Alex; Williams, Samuel Webb; Madduri, Kamesh; Ibrahim, Khaled; Bailey, David H.; Demmel, James W.; Strohmaier, Erich

2010-12-02T23:59:59.000Z

240

A Neutron Scattering Kernel of Solid Methane in phase II  

E-Print Network (OSTI)

A neutron scattering cross section model for solid methane was studied in the temperature ranges of 20.4$\\sim$4K. The analytical scattering kernel was adapted from Ozaki.$\\it{et al.}$\\cite{ozaki:3442}\\cite{ozaki2} to describe molecular rotation in this temperature range. This model includes a molecular translation and intramolecular vibration as well as the rotational degree of freedom in effective ways. Total scattering cross sections were calculated from the model and evaluated by comparing with the cross section measurement of Grieger\\cite{grieger:3161} and Whittemore\\cite{Wittemore} for incident neutron energy of 0.1 \\textit{meV} $\\sim$ 1\\textit{eV}. We produced frequency spectra from the model in the temperature range. The results were also compared with the Harker $&$ Brugger frequency spectrum at 22K\\cite{HARKER1967}. For broader applications, neutron scattering kernels for MCNP (Monte Carlo N Particle Transport Code) were produced at 20K and 4K from the frequency spectra using NJOY code. The scatt...

Shin, Yunchang; Liu, Chen-yu; Lavelle, Christopher M; Baxter, David V

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

242

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

243

Borel summation of the small time expansion of the heat kernel with a vector potential  

E-Print Network (OSTI)

We study the Borel summability of the small time expansion of the heat kernel associated to a first order perturbation of a Laplacian. An explicit formula for this kernel plays a central role. As a consequence, we get a Poisson formula on the torus.

Thierry Harge

2013-02-04T23:59:59.000Z

244

Linking non-binned spike train kernels to several existing spike train metrics  

Science Conference Proceedings (OSTI)

This work presents three kernel functions that can be used as inner product operators on non-binned spike trains, allowing the use of state-of-the-art classification techniques. One of the main advantages is that this approach does not require the spike ... Keywords: Kernel methods, Non-binned, Spike train classification, Spike train metrics

Benjamin Schrauwen; Jan Van Campenhout

2007-03-01T23:59:59.000Z

245

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

246

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

247

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

248

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

249

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

250

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

251

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

252

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

253

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

254

Cultivar and E-Beam irradiation effects on phytochemical content and antioxidant properties of pecan kernels  

E-Print Network (OSTI)

Pecan kernels from six cultivars were analyzed for phenolic content and antioxidant properties. In addition, kernels from two cultivars were irradiated with 0, 1.5 and 3.0 kGy using E-Beam irradiation and stored in accelerated conditions (40 °C and 55% R.H.). Changes in phytochemical profile and antioxidant properties were monitored for 134 days. Cultivars differed greatly in their phytochemical content. Total extractable phenolic content (TP) ranged from 62 to 106 milligrams of chlorogenic acid equivalents per gram of defatted kernel. Antioxidant capacity (AC) measured by the DPPH free radical had a strong correlation with TP. Shells from each cultivar were 6, 4.5 and 18 times greater for TP, AC and condensed tannin content (CT). Gallic and ellagic acids, epicatechin and catechin were identified in hydrolyzed extracts of all cultivars. Prior to hydrolysis, no compounds were positively identified. Fatty acid profile of kernel oil had a strong inverse correlation between oleic and linoleic oil. Kernels from the same cultivar but different location differed in their fatty acid composition but had similar TP. Irradiation of Kanza and Desirable kernels with 1.5 and 3.0 kGy had no detrimental effects on AC and TP by the end of experiments. Phenolic profile was similar for all treatments. Tocopherol content decreased with irradiation treatments, but no further degradation was observed throughout storage. Peroxide values increased slightly after 98 and 134 days of storage for Desirable kernels, with slight differences between controls and irradiated samples. Color of kernels decreased in lightness and yellowness and increased in redness with no differences between irradiated samples and controls. For the first time the effect of pecan cultivar and E-Beam irradiation was assessed in phytochemical and antioxidant attributes of pecan kernels. Additionally, irradiation with E-Beam had no significant detrimental effects in phytochemical composition and only a slight increase in peroxide value, indicating potential as pecan kernel sanitization.

Villarreal Lozoya, Jose Emilio

2006-05-01T23:59:59.000Z

255

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

256

KEPLER'S OPTICAL SECONDARY ECLIPSE OF HAT-P-7b AND PROBABLE DETECTION OF PLANET-INDUCED STELLAR GRAVITY DARKENING  

SciTech Connect

We present observations spanning 355 orbital phases of HAT-P-7 observed by Kepler from 2009 May to 2011 March (Q1-9). We find a shallower secondary eclipse depth than initially announced, consistent with a low optical albedo and detection of nearly exclusively thermal emission, without a reflected light component. We find an approximately 10 ppm perturbation to the average transit light curve near phase -0.02 that we attribute to a temperature decrease on the surface of the star, phased to the orbit of the planet. This cooler spot is consistent with planet-induced gravity darkening, slightly lagging the sub-planet position due to the finite response time of the stellar atmosphere. The brightness temperature of HAT-P-7b in the Kepler bandpass is T{sub B} = 2733 {+-} 21 K and the amplitude of the deviation in stellar surface temperature due to gravity darkening is approximately -0.18 K. The detection of the spot is not statistically unequivocal due its small amplitude, though additional Kepler observations should be able to verify the astrophysical nature of the anomaly.

Morris, Brett M.; Deming, Drake [Department of Astronomy, University of Maryland, College Park, MD 20742 (United States); Mandell, Avi M. [Goddard Center for Astrobiology, NASA's Goddard Space Flight Center, Greenbelt, MD 20771 (United States)

2013-02-20T23:59:59.000Z

257

ANALYSIS OF SPIN-ORBIT ALIGNMENT IN THE WASP-32, WASP-38, AND HAT-P-27/WASP-40 SYSTEMS  

SciTech Connect

We present measurements of the spin-orbit alignment angle, {lambda}, for the hot Jupiter systems WASP-32, WASP-38, and HAT-P-27/WASP-40, based on data obtained using the HARPS spectrograph. We analyze the Rossiter-McLaughlin effect for all three systems and also carry out Doppler tomography for WASP-32 and WASP-38. We find that WASP-32 (T {sub eff} = 6140{sup +90} {sub -100} K) is aligned, with an alignment angle of {lambda} = 10.{sup 0}5{sup +6.4} {sub -6.5} obtained through tomography, and that WASP-38 (T {sub eff} = 6180{sup +40} {sub -60} K) is also aligned, with tomographic analysis yielding {lambda} = 7.{sup 0}5{sup +4.7} {sub -6.1}. The latter result provides an order-of-magnitude improvement in the uncertainty in {lambda} compared to the previous analysis of Simpson et al. We are only able to loosely constrain the angle for HAT-P-27/WASP-40 (T{sub eff} = 5190{sup +160} {sub -170} K) to {lambda} = 24.{sup 0}2{sup +76.0}{sub -44.5}, owing to the poor signal-to-noise ratio of our data. We consider this result a non-detection under a slightly updated version of the alignment test of Brown et al. We place our results in the context of the full sample of spin-orbit alignment measurements, finding that they provide further support for previously established trends.

Brown, D. J. A.; Collier Cameron, A.; Enoch, B.; Miller, G. R. M. [SUPA, School of Physics and Astronomy, University of St Andrews, North Haugh, St Andrews, Fife KY16 9SS (United Kingdom); Diaz, R. F. [LAM (Laboratoire d'Astrophysique de Marseille), Aix Marseille Universite, CNRS, UMR 7326, F-13388 Marseille (France); Doyle, A. P.; Smalley, B.; Anderson, D. R.; Hellier, C.; Maxted, P. F. L. [Astrophysics Group, School of Physical and Geographical Sciences, Lennard-Jones Building, Keele University, Staffordshire ST5 5BG (United Kingdom); Gillon, M. [Institut d'Astrophysique et de Geophysique, Universite de Liege, Allee du 6 Aout, 17 (Bat. B5C) Sart Tilman, B-4000 Liege (Belgium); Lendl, M.; Triaud, A. H. M. J.; Queloz, D. [Observatoire Astronomique de l'Universite de Geneve, 51 Chemin des Maillettes, CH-1290 Sauverny (Switzerland); Pollacco, D. [Astrophysics Research Centre, School of Mathematics and Physics, Queen's University, University Road, Belfast BT7 1NN (United Kingdom); Boisse, I. [Centro de Astrofisica, Universidade do Porto, Rua das Estrelas, 4150-762 Porto (Portugal); Hebrard, G., E-mail: djab@st-andrews.ac.uk [Institut dAstrophysique de Paris, UMR7095 CNRS, Universite Pierre and Marie Curie, 98bis boulevard Arago, F-75014 Paris (France)

2012-12-01T23:59:59.000Z

258

HAT-P-15b: A 10.9-day Extrasolar Planet Transiting a Solar-type Star  

E-Print Network (OSTI)

We report the discovery of HAT-P-15b, a transiting extrasolar planet in the `period valley', a relatively sparsely-populated period regime of the known extrasolar planets. The host star, GSC 2883-01687, is a G5 dwarf with V=12.16. It has a mass of 1.01+/-0.04 M(Sun), radius of 1.08+/-0.04 R(Sun), effective temperature 5568+/-90 K, and metallicity [Fe/H] = +0.22+/-0.08. The planetary companion orbits the star with a period 10.863502+/-0.000027 days, transit epoch Tc = 2454638.56019+/-0.00048 (BJD), and transit duration 0.2285+/-0.0015 days. It has a mass of 1.946+/-0.066 M(Jup), and radius of 1.072+/-0.043 R(Jup) yielding a mean density of 1.96+/-0.22 g/cm3. At an age of 6.8+/-2.1 Gyr, the planet is H/He-dominated and theoretical models require about 2% (10 M(Earth)) worth of heavy elements to reproduce its measured radius. With an estimated equilibrium temperature of 820 K during transit, and 1000 K at occultation, HAT-P-15b is a potential candidate to study moderately cool planetary atmospheres by transmissi...

Kovcs, G; Hartman, J D; Torres, G; Noyes, R W; Latham, D W; Howard, A W; Fischer, D A; Johnson, J A; Marcy, G W; Isaacson, H; Sasselov, D D; Stefanik, R P; Esquerdo, G A; Fernandez, J M; Bky, B; Lzr, J; Papp, I; Sri, P

2010-01-01T23:59:59.000Z

259

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

260

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

262

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

263

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

264

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

265

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

266

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

267

Kernel functions and Baecklund transformations for relativistic Calogero-Moser and Toda systems  

SciTech Connect

We obtain kernel functions associated with the quantum relativistic Toda systems, both for the periodic version and for the nonperiodic version with its dual. This involves taking limits of previously known results concerning kernel functions for the elliptic and hyperbolic relativistic Calogero-Moser systems. We show that the special kernel functions at issue admit a limit that yields generating functions of Baecklund transformations for the classical relativistic Calogero-Moser and Toda systems. We also obtain the nonrelativistic counterparts of our results, which tie in with previous results in the literature.

Hallnaes, Martin [School of Mathematics, Loughborough University, Loughborough LE11 3TU (United Kingdom); Ruijsenaars, Simon [School of Mathematics, University of Leeds, Leeds LS2 9JT (United Kingdom)

2012-12-15T23:59:59.000Z

268

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

269

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

270

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

271

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

272

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

273

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

274

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

276

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

277

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

278

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

279

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

280

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

282

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

283

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

284

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

285

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

286

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

287

T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01: Windows Kernel win32k.sys Lets Local Users Gain Elevated 01: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges April 13, 2011 - 5:12am Addthis PROBLEM: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges PLATFORM: Windows XP Service Pack 3, Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 1 and Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*, Windows Server 2008 for x64-based Systems

288

Multi-Scale Kernel Latent Variable Models for Nonlinear Time Series Pattern Matching  

Science Conference Proceedings (OSTI)

In this paper we propose a method for nonlinear time series pattern matching: "Multi-Scale Kernel Latent Variable (MSKLV) models". The pattern matching methodology includes multi-scale analysis using wavelet decomposition of time series and finding latent ...

B. Venkataramana Kini; C. Chandra Sekhar

2008-01-01T23:59:59.000Z

289

The kernel of the edth operators on higher-genus spacelike two-surfaces  

E-Print Network (OSTI)

The dimension of the kernels of the edth and edth-prime operators on closed, orientable spacelike 2-surfaces with arbitrary genus is calculated, and some of its mathematical and physical consequences are discussed.

J. Frauendiener; L. B. Szabados

2000-10-24T23:59:59.000Z

290

Exact noise kernel for quantum fields in static de Sitter and conformally-flat spacetimes  

E-Print Network (OSTI)

We compute exact expressions of the noise kernel, defined as the expectation value of the symmetrized connected stress energy bitensor, for conformally-invariant scalar fields with respect to the conformal vacuum, valid for an arbitrary separation (timelike, spacelike and null) of points in a class of conformally-flat spacetimes. We derive explicit expressions for the noise kernel evaluated in the static de Sitter coordinates with respect to the Gibbons-Hawking vacuum and analyze the behavior of the noise kernel in the region near the cosmological horizon. We develop a quasi-local expansion near the cosmological horizon and compare it with the exact results. This gives insight into the likely range of validity of the quasi-local approximation expressions for the noise kernel for the conformally invariant scalar field in Schwarzschild spacetime which are given in PHYSICAL REVIEW D{\\bf 85}, 044037 (2012).

Jason D. Bates; Hing-Tong Cho; Paul R. Anderson; B. L. Hu

2013-01-11T23:59:59.000Z

291

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

292

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

293

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

294

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

295

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

296

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

297

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

298

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

299

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

300

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Large diffusion expansion of the transition kernel of the Lvy Ornstein-Uhlenbeck process  

E-Print Network (OSTI)

In this paper we study the L\\'evy Ornstein- Uhlenbeck equation $\\partial_t X_t=-m\\,X_t+\\eta$. The transition kernel of the L\\'evy Ornstein- Uhlenbeck process is given by a series which is not convergent in general, a large diffusion expansion of the transition kernel of the L\\'evy Ornstein- Uhlenbeck process will be given as well. The obtained series can be re-expressed in terms of generalized Feynman graphs and Feynman rules.

Boubaker Smii

2010-04-14T23:59:59.000Z

302

Spark ignited turbulent flame kernel growth. Annual report, January--December, 1992  

DOE Green Energy (OSTI)

Cyclic combustion variations in spark-ignition engines limit the use of dilute charge strategies for achieving low NO{sub x} emissions and improved fuel economy. Results from an experimental study of the effect of incomplete fuel-air mixing (ifam) on spark-ignited flame kernel growth in turbulent propane-air mixtures are presented. The experiments were conducted in a turbulent flow system that allows for independent variation of flow parameters, ignition system parameters, and the degree of fuel-air mixing. Measurements were made at 1 atm and 300 K conditions. Five cases were studied; a premixed and four incompletely mixed cases with 6%, 13%, 24% and 33% RMS (root-mean-square) fluctuations in the fuel/air equivalence ratio. High speed laser shadowgraphy at 4,000 frames-per-second was used to record flame kernel growth following spark ignition, from which the equivalent flame kernel radius as a function of time was determined. The effect of ifam was evaluated in terms of the flame kernel growth rate, cyclic variations in the flame kernel growth, and the rate of misfire. The results show that fluctuations in local mixture strength due to ifam cause the flame kernel surface to become wrinkled and distorted; and that the amount of wrinkling increases as the degree of ifam. Ifam was also found to result in a significant increase in cyclic variations in the flame kernel growth. The average flame kernel growth rates for the premixed and the incompletely mixed cases were found to be within the experimental uncertainty except for the 33%-RMS-fluctuation case where the growth rate is significantly lower. The premixed and 6%-RMS-fluctuation cases had a 0% misfire rate. The misfire rates were 1% and 2% for the 13%-RMS-fluctuation and 24%-RMS-fluctuation cases, respectively; however, it drastically increased to 23% in the 33%-RMS-fluctuation case.

Santavicca, D.A.

1994-06-01T23:59:59.000Z

303

Estimating the Bias of Local Polynomial Approximations Using the Peano Kernel  

SciTech Connect

These presentation visuals define local polynomial approximations, give formulas for bias and random components of the error, and express bias error in terms of the Peano kernel. They further derive constants that give figures of merit, and show the figures of merit for 3 common weighting functions. The Peano kernel theorem yields estimates for the bias error for local-polynomial-approximation smoothing that are superior in several ways to the error estimates in the current literature.

Blair, J., and Machorro, E.

2012-03-22T23:59:59.000Z

304

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

305

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

306

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

307

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

308

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

309

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

310

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

311

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

312

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

313

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

314

Improved prediction of biomass composition for switchgrass using reproducing kernel methods with wavelet compressed FT-NIR spectra  

Science Conference Proceedings (OSTI)

Fourier transform near-infrared (FT-NIR) technique is an effective approach to predict chemical properties and can be applied to online monitoring in bio-energy industry. High dimensionality and collinearity of the FT-NIR spectral data makes it difficult ... Keywords: Fourier transform near-infrared spectra, Kernel partial least squares regression, Kernel ridge regression, Reproducing kernel Hilbert space, Vertical energy thresholding technique, Wavelet transform

Jong I. Park; Lu Liu; X. Philip Ye; Myong K. Jeong; Young-Seon Jeong

2012-01-01T23:59:59.000Z

315

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

316

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

317

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

318

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

319

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

320

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Starch properties, endogenous amylase activity, and ethanol production of corn kernels with different planting dates and drying conditions.  

E-Print Network (OSTI)

??This study was conducted with aim to understand how planting dates and drying conditions affected starch properties and dry-grind ethanol production of corn kernels. Three (more)

Medic, Jelena

2011-01-01T23:59:59.000Z

322

Physics Experiments and Abstract Harmonic Analysis: A Generalized Peano Kernel Theorem for Estimating Errors in Laser Interferometry  

SciTech Connect

This slide-show discusses the use of the Local Polynomial Approximation (LPA) to smooth signals from photonic Doppler velocimetry (PDV) applying a generalized Peano kernel theorem.

Luttman, A.

2012-10-08T23:59:59.000Z

323

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

324

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

325

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

326

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

327

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

328

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

329

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

330

A Fourier-series-based kernel-independent fast multipole method  

SciTech Connect

We present in this paper a new kernel-independent fast multipole method (FMM), named as FKI-FMM, for pairwise particle interactions with translation-invariant kernel functions. FKI-FMM creates, using numerical techniques, sufficiently accurate and compressive representations of a given kernel function over multi-scale interaction regions in the form of a truncated Fourier series. It provides also economic operators for the multipole-to-multipole, multipole-to-local, and local-to-local translations that are typical and essential in the FMM algorithms. The multipole-to-local translation operator, in particular, is readily diagonal and does not dominate in arithmetic operations. FKI-FMM provides an alternative and competitive option, among other kernel-independent FMM algorithms, for an efficient application of the FMM, especially for applications where the kernel function consists of multi-physics and multi-scale components as those arising in recent studies of biological systems. We present the complexity analysis and demonstrate with experimental results the FKI-FMM performance in accuracy and efficiency.

Zhang Bo, E-mail: zhangb@cs.duke.edu [Department of Computer Science, Duke University, Durham, NC 27708 (United States); Huang Jingfang, E-mail: huang@amath.unc.edu [Department of Mathematics, University of North Carolina at Chapel Hill, CB 3250, Phillips Hall, Chapel Hill, NC 27599 (United States); Pitsianis, Nikos P., E-mail: nikos.pitsianis@eng.auth.gr [Department of Computer Science, Duke University, Durham, NC 27708 (United States); Department of Electrical and Computer Engineering, Aristotle University, Thessaloniki 54124 (Greece); Sun Xiaobai, E-mail: xiaobai@cs.duke.edu [Department of Computer Science, Duke University, Durham, NC 27708 (United States)

2011-07-01T23:59:59.000Z

331

THE HAT-P-13 EXOPLANETARY SYSTEM: EVIDENCE FOR SPIN-ORBIT ALIGNMENT AND A THIRD COMPANION  

SciTech Connect

We present new radial velocity (RV) measurements of HAT-P-13, a star with two previously known companions: a transiting giant planet 'b' with an orbital period of 3 days and a more massive object 'c' on a 1.2 yr, highly eccentric orbit. For this system, dynamical considerations would lead to constraints on planet b's interior structure, if it could be shown that the orbits are coplanar and apsidally locked. By modeling the Rossiter-McLaughlin effect, we show that planet b's orbital angular momentum vector and the stellar spin vector are well aligned on the sky ({lambda} = 1.9 {+-} 8.6 deg). The refined orbital solution favors a slightly eccentric orbit for planet b (e = 0.0133 {+-} 0.0041), although it is not clear whether it is apsidally locked with c's orbit ({Delta}{omega} = 36{sup +27}{sub -36} deg). We find a long-term trend in the star's RV and interpret it as evidence for an additional body 'd', which may be another planet or a low-mass star. Predictions are given for the next few inferior conjunctions of c, when transits may happen.

Winn, Joshua N.; Albrecht, Simon [Department of Physics, and Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Johnson, John Asher [Department of Astrophysics, California Institute of Technology, MC 249-17, Pasadena, CA 91125 (United States); Howard, Andrew W.; Marcy, Geoffrey W. [Department of Astronomy, University of California, Mail Code 3411, Berkeley, CA 94720 (United States); Bakos, Gaspar A.; Hartman, Joel; Torres, Guillermo [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States); Narita, Norio [Kavli Institute for Theoretical Physics, UCSB, Santa Barbara, CA 93106 (United States)

2010-07-20T23:59:59.000Z

332

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

333

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

334

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

335

Radiological audit of remedial action activities at the processing sites Mexican Hat, Utah and Monument Valley, Arizona. Audit date: May 3--7, 1993, Final report  

SciTech Connect

The Uranium Mill Tailings Remedial Action (UMTRA) Project`s Technical Assistance Contractor (TAC) performed a radiological audit of the Remedial Action Contractor (RAC), MK-Ferguson and CWM Federal Environmental Services, Inc., at the processing sites in Mexican Hat, Utah, and Monument Valley, Arizona. This audit was conducted May 3--7, 1993, by Bill James and Gerry Simiele of the TAC. Three site-specific findings and four observations were identified during the audit and are presented in this report. The overall conclusion from the audit is that the majority of the radiological aspects of the Mexican Hat, Utah, and Monument Valley, Arizona, remedial action programs are performed adequately. However, the findings identify that there is some inconsistency in following procedures and meeting requirements for contamination control, and a lack of communication between the RAC and the DOE on variances from the published remedial action plan (RAP).

NONE

1993-05-01T23:59:59.000Z

336

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

337

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

338

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

339

Remedial Action Plan and site design for stabilization of the inactive uranium mill tailings site at Mexican Hat, Utah: Appendix D. Final report  

Science Conference Proceedings (OSTI)

This appendix is an assessment of the present conditions of the inactive uranium mill site near Mexican Hat, Utah. It consolidates available engineering, radiological, geotechnical, hydrological, meteorological, and other information pertinent to the design of the Remedial Action Plan. Plan is to characterize the conditions at the mill and tailings site so that the Remedial Action Contractor may complete final designs of the remedial action.

NONE

1988-07-01T23:59:59.000Z

340

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

342

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

343

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

344

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

345

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

346

Remedial Action Plan and site design for stabilization of the inactive uranium mill tailings site at Mexican Hat, Utah: Text, Appendices A--C. Final report  

SciTech Connect

This Remedial Action Plan (RAP) has been developed to serve a two- fold purpose. It presents the activities proposed by the Department of Energy (DOE) to accomplish long-term stabilization and control of the residual radioactive materials (RRM) from Monument Valley Arizona, and Mexican Hat, Utah, at the Mexican Hat disposal site. It also serves to document the concurrence of both the Navajo Nation and the Nuclear Regulatory Commission (NRC) in the remedial action. This agreement, upon execution by DOE and the Navajo Nation and concurrence by the NRC, becomes Appendix B of the Cooperative Agreement. This document has been structured to provide a comprehensive understanding of the remedial action proposed for the Monument Valley and Mexican Hat sites. It includes specific design and construction requirements for the remedial action. Pertinent information and data are included with reference given to the supporting documents. Appendices A,B, and C are provided as part of this document. Appendix A presents regulatory compliance issues, Appendix B provides details of the engineering design, and Appendix C presents the radiological support plan.

NONE

1988-07-01T23:59:59.000Z

347

The weak heat kernel asymptotic expansion and the quantum double suspension  

E-Print Network (OSTI)

In this paper we are concerned with the construction of a general principle that will allow us to produce regular spectral triples with finite and simple dimension spectrum. We introduce the notion of weak heat kernel asymptotic expansion (WHKAE) property of a spectral triple and show that the weak heat kernel asymptotic expansion allows one to conclude that the spectral triple is regular with finite simple dimension spectrum. The usual heat kernel expansion implies this property. Finally we show that WHKAE is stable under quantum double suspension, a notion introduced by Hong and Szymanski. Therefore quantum double suspending compact Riemannian spin manifolds iteratively we get many examples of regular spectral triples with finite simple dimension spectrum. This covers all the odd dimensional quantum spheres. Our methods also apply to the case of noncommutative torus.

Chakraborty, Partha Sarathi

2010-01-01T23:59:59.000Z

348

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

349

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

350

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

351

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

352

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

353

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

354

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

355

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

356

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

357

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

358

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

359

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

360

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

362

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

363

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

364

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

365

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

366

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

367

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

368

Anomalous heat-kernel decay for random walk among polynomial lower tail random conductances  

E-Print Network (OSTI)

We consider the nearest-neighbor simple random walk on $\\Z^{d}$, $d\\geq 4$, driven by a field of i.i.d. random nearest-neighbor conductances $\\omega_{xy}\\in[0,1]$. Our aim is to derive estimates of the heat-kernel decay in a case where ellipticity assumption is absent. We consider the case of independant conductances with polynomial tail near 0 and obtain for almost every environment an anomalous lower bound on the heat-kernel.

Boukhadra, Omar

2008-01-01T23:59:59.000Z

369

Investigation of tilted dose kernels for portal dose prediction in a-Si electronic portal imagers  

SciTech Connect

The effect of beam divergence on dose calculation via Monte Carlo generated dose kernels was investigated in an amorphous silicon electronic portal imaging device (EPID). The flat-panel detector was simulated in EGSnrc with an additional 3.0 cm water buildup. The model included details of the detector's imaging cassette and the front cover upstream of it. To approximate the effect of the EPID's rear housing, a 2.1 cm air gap and 1.0 cm water slab were introduced into the simulation as equivalent backscatter material. Dose kernels were generated with an incident pencil beam of monoenergetic photons of energy 0.1, 2, 6, and 18 MeV. The orientation of the incident pencil beam was varied from 0 deg. to 14 deg. in 2 deg. increments. Dose was scored in the phosphor layer of the detector in both cylindrical (at 0 deg. ) and Cartesian (at 0 deg. -14 deg.) geometries. To reduce statistical fluctuations in the Cartesian geometry simulations at large radial distances from the incident pencil beam, the voxels were first averaged bilaterally about the pencil beam and then combined into concentric square rings of voxels. Profiles of the EPID dose kernels displayed increasing asymmetry with increasing angle and energy. A comparison of the superposition (tilted kernels) and convolution (parallel kernels) dose calculation methods via the {chi}-comparison test (a derivative of the {gamma}-evaluation) in worst-case-scenario geometries demonstrated an agreement between the two methods within 0.0784 cm (one pixel width) distance-to-agreement and up to a 1.8% dose difference. More clinically typical field sizes and source-to-detector distances were also tested, yielding at most a 1.0% dose difference and the same distance-to-agreement. Therefore, the assumption of parallel dose kernels has less than a 1.8% dosimetric effect in extreme cases and less than a 1.0% dosimetric effect in most clinically relevant situations and should be suitable for most clinical dosimetric applications. The resulting time difference for the parallel kernel assumption versus the tilted kernels was 10.5 s vs 18 h (a factor of approximately 6000), dependent on existing hardware and software details.

Chytyk, K.; McCurdy, B. M. C. [Division of Medical Physics, CancerCare Manitoba, 675 McDermot Avenue, Winnipeg, Manitoba R3E 0V9, Canada and Department of Physics and Astronomy, University of Manitoba, Winnipeg, Manitoba R3T 2N2 (Canada); Division of Medical Physics, CancerCare Manitoba, 675 McDermot Avenue, Winnipeg, Manitoba R3E 0V9 (Canada); Department of Physics and Astronomy, University of Manitoba, Winnipeg, Manitoba R3T 2N2 (Canada) and Department of Radiology, University of Manitoba, Winnipeg, Manitoba R3A 1R9 (Canada)

2006-09-15T23:59:59.000Z

370

Research on Fault Diagnosis of Marine Diesel Engine Based on Grey Relational Analysis and Kernel Fuzzy C-means Clustering  

Science Conference Proceedings (OSTI)

According to the problem of small samples and nonlinear feature in fault diagnosis of marine diesel engine, comprehensively using the methods of grey relational analysis and kernel fuzzy c-means clustering, a method solving fault diagnosis of marine ... Keywords: marine diesel engine, fault diagnosis, grey relational analysis, kernel fuzzy c-means clustering

Xiuyan Peng; Yanyou Chai; Yanyou Chai; Liufeng Xu; Xinjiang Man

2012-01-01T23:59:59.000Z

371

A robust kernel-based fuzzy c-means algorithm by incorporating suppressed and magnified membership for MRI image segmentation  

Science Conference Proceedings (OSTI)

Bias-corrected fuzzy c-means (BCFCM) algorithm with spatial information has been proven effective for image segmentation. It still lacks enough robustness to noise and outliers. Some kernel versions of FCM with spatial constraints, such as KFCM_S1, ... Keywords: Kernel-based FCM, fuzzy c-means (FCM), image segmentation, magic resonance image segmentation, spatial bias correction, suppressed membership

Hsu-Shen Tsai; Wen-Liang Hung; Miin-Shen Yang

2012-10-01T23:59:59.000Z

372

On the regularity of solutions to integral equations with nonsmooth kernels on a union of open intervals  

Science Conference Proceedings (OSTI)

The behaviour of a solution to a Fredholm integral equation of the second kind on a union of open intervals is examined. The kernel of the corresponding integral operator may have diagonal singularities, information about them is given through certain ... Keywords: 45B05, 45D05, 45M05, Boundary singularities, Compact operators, Fredholm integral equation, Smoothness of the solution, Weakly singular kernel

Arvet Pedas; Gennadi Vainikko

2009-07-01T23:59:59.000Z

373

Identification of insect-damaged wheat kernels using short-wave near-infrared hyperspectral and digital colour imaging  

Science Conference Proceedings (OSTI)

Healthy wheat kernels and wheat kernels damaged by the feeding of the insects: rice weevil (Sitophilus oryzae), lesser grain borer (Rhyzopertha dominica), rusty grain beetle (Cryptolestes ferrugineus), and red flour beetle (Tribolium castaneum) were ... Keywords: Grain quality, Hyperspectral imaging, Machine vision, NIR

Chandra B. Singh; Digvir S. Jayas; Jitendra Paliwal; Noel D. G. White

2010-08-01T23:59:59.000Z

374

Bayesian multiple response kernel regression model for high dimensional data and its practical applications in near infrared spectroscopy  

Science Conference Proceedings (OSTI)

Non-linear regression based on reproducing kernel Hilbert space (RKHS) has recently become very popular in fitting high-dimensional data. The RKHS formulation provides an automatic dimension reduction of the covariates. This is particularly helpful when ... Keywords: Bayesian prediction, Laplace distribution, Metropolis-Hastings algorithm, Near infrared spectroscopy, Nonlinear regression, Reproducing kernel Hilbert space, Vapnik's ?-insensitive loss

Sounak Chakraborty

2012-09-01T23:59:59.000Z

375

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

376

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

377

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

378

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

379

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

380

FIPS 140-2 Security Policy  

Science Conference Proceedings (OSTI)

... Data Input API input parameters Data Output API return values Control Input API function calls Status Output API return codes; Kernel log file ...

2013-09-17T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

382

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

383

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

384

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

385

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

386

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

387

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

388

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

389

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

390

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

391

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

392

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

393

THE KERNEL OF AN HOMOMORPHISM OF HARISH-CHANDRA T. LEVASSEUR AND J. T. STAFFORD  

E-Print Network (OSTI)

THE KERNEL OF AN HOMOMORPHISM OF HARISH-CHANDRA T. LEVASSEUR AND J. T. STAFFORD Abstract. Let g. LEVASSEUR AND J. T. STAFFORD Dixmier and Wallach raised Question (y) is that it has as an immediate 2 F k , then L is a at right C k -module. #12; 4 T. LEVASSEUR AND J. T. STAFFORD Proof. Suppose

Levasseur, Thierry

394

Kernel Partitioning of Streaming Applications: A Statistical Approach to an NP-complete Problem  

Science Conference Proceedings (OSTI)

One of the greatest challenges in computer architecture is how to write efficient, portable, and correct software for multi-core processors. A promising approach is to expose more parallelism to the compiler, through the use of domain-specific languages. ... Keywords: Kernel partitioning, StremIt, Extreme Value Theory

Petar Radojkovic; Paul M. Carpenter; Miquel Moreto; Alex Ramirez; Francisco J. Cazorla

2012-12-01T23:59:59.000Z

395

HARTEX: a safe real-time kernel for distributed computer control systems  

Science Conference Proceedings (OSTI)

A hard real-time kernel is presented for distributed computer control systems (DCCS), highlighting a number of novel features, such as integrated scheduling of hard and soft real-time tasks as well as tasks and resources; high-performance time management ... Keywords: distributed computer control systems, object modelling techniques, real-time communication, real-time operating systems, scheduling algorithms

C. K. Angelov; I. E. Ivanov; A. Burns

2002-03-01T23:59:59.000Z

396

KCMAC-BYY: Kernel CMAC using Bayesian Ying-Yang learning  

Science Conference Proceedings (OSTI)

The Cerebellar Model Articulation Controller (CMAC) possesses attractive properties of fast learning and simple computation. In application, the size of its association vector is always reduced to economize the memory requirement, greatly constraining ... Keywords: Bayesian Ying-Yang learning, CMAC, Kernel machine

K. Tian; B. Guo; G. Liu; I. Mitchell; D. Cheng; W. Zhao

2013-02-01T23:59:59.000Z

397

Selection and Properties of Alternative Forming Fluids for TRISO Fuel Kernel Production  

SciTech Connect

Current Very High Temperature Reactor (VHTR) designs incorporate TRi-structural ISOtropic (TRISO) fuel, which consists of a spherical fissile fuel kernel surrounded by layers of pyrolytic carbon and silicon carbide. An internal sol-gel process forms the fuel kernel using wet chemistry to produce uranium oxyhydroxide gel spheres by dropping a cold precursor solution into a hot column of trichloroethylene (TCE). Over time, gelation byproducts inhibit complete gelation, and the TCE must be purified or discarded. The resulting TCE waste stream contains both radioactive and hazardous materials and is thus considered a mixed hazardous waste. Changing the forming fluid to a non-hazardous alternative could greatly improve the economics of TRISO fuel kernel production. Selection criteria for a replacement forming fluid narrowed a list of ~10,800 chemicals to yield ten potential replacement forming fluids: 1-bromododecane, 1- bromotetradecane, 1-bromoundecane, 1-chlorooctadecane, 1-chlorotetradecane, 1-iododecane, 1-iodododecane, 1-iodohexadecane, 1-iodooctadecane, and squalane. The density, viscosity, and surface tension for each potential replacement forming fluid were measured as a function of temperature between 25 C and 80 C. Calculated settling velocities and heat transfer rates give an overall column height approximation. 1-bromotetradecane, 1-chlorooctadecane, and 1-iodododecane show the greatest promise as replacements, and future tests will verify their ability to form satisfactory fuel kernels.

Doug Marshall; M. Baker; J. King; B. Gorman

2013-01-01T23:59:59.000Z

398

Robust weighted kernel logistic regression in imbalanced and rare events data  

Science Conference Proceedings (OSTI)

Recent developments in computing and technology, along with the availability of large amounts of raw data, have contributed to the creation of many effective techniques and algorithms in the fields of pattern recognition and machine learning. The main ... Keywords: Classification, Endogenous sampling, Kernel methods, Logistic regression, Truncated Newton

Maher Maalouf; Theodore B. Trafalis

2011-01-01T23:59:59.000Z

399

Using a shallow linguistic kernel for drug-drug interaction extraction  

Science Conference Proceedings (OSTI)

A drug-drug interaction (DDI) occurs when one drug influences the level or activity of another drug. Information Extraction (IE) techniques can provide health care professionals with an interesting way to reduce time spent reviewing the literature for ... Keywords: Biomedical information extraction, Drug-drug interactions, Machine learning, MetaMap, Patient safety, Shallow linguistic kernel, Unified medical language system

Isabel Segura-Bedmar; Paloma MartNez; Cesar De Pablo-SNchez

2011-10-01T23:59:59.000Z

400

Kernel Density Estimation Applied to Tropical Cyclones Genesis in Northwestern Pacific  

Science Conference Proceedings (OSTI)

It is recognized that although the conditions necessary for generating cyclones are actually present in the tropical latitudes for much of the year, the storms themselves are comparatively rare. In addition, the skill of forecasting the occurrence of ... Keywords: genesis, kernel density estimation, tropical cyclone

Zhao Haikun; Wu Liguang; Zhou Weican

2009-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

402

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

403

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

404

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

405

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

406

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

407

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

408

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

409

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

410

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

411

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

412

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

413

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

414

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

415

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

416

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

417

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

418

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

419

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

420

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

422

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

423

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

424

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

425

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

426

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

427

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI für Informatik Univ. Tübingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

428

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

429

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

430

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

431

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

432

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

433

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

434

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

435

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

436

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

437

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

438

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

439

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

440

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

A systematic review of security requirements engineering  

Science Conference Proceedings (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

442

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

443

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

444

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

445

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

446

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

447

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

448

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Mithra...

449

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

450

Palm Oil: Production, Processing, Uses, and CharacterizationChapter 12 Palm Oil and Palm Kernel Oil Refining and Fractionation Technology  

Science Conference Proceedings (OSTI)

Palm Oil: Production, Processing, Uses, and Characterization Chapter 12 Palm Oil and Palm Kernel Oil Refining and Fractionation Technology Food Science Health Nutrition Biochemistry Processing eChapters Food Science & Technology Health

451

Palm Oil: Production, Processing, Uses, and CharacterizationChapter 9 Palm and Palm Kernel Oil Production and Processing in Brazil  

Science Conference Proceedings (OSTI)

Palm Oil: Production, Processing, Uses, and Characterization Chapter 9 Palm and Palm Kernel Oil Production and Processing in Brazil Food Science Health Nutrition Biochemistry Processing eChapters Food Science & Technology Health - Nutri

452

Palm Oil: Production, Processing, Uses, and CharacterizationChapter 10 Palm and Palm Kernel Oil Production and Processing in Nigeria  

Science Conference Proceedings (OSTI)

Palm Oil: Production, Processing, Uses, and Characterization Chapter 10 Palm and Palm Kernel Oil Production and Processing in Nigeria Food Science Health Nutrition Biochemistry Processing eChapters Food Science & Technology Health - Nut

453

Gourmet and Health-Promoting Specialty OilsChapter 15 Corn Kernel Oil and Corn Fiber Oil  

Science Conference Proceedings (OSTI)

Gourmet and Health-Promoting Specialty Oils Chapter 15 Corn Kernel Oil and Corn Fiber Oil Health Nutrition Biochemistry eChapters Health - Nutrition - Biochemistry Press Downloadable pdf of Chapter 15 Corn Kerne

454

Palm Oil: Production, Processing, Uses, and CharacterizationChapter 11 Oil Recovery from Palm Fruits and Palm Kernel  

Science Conference Proceedings (OSTI)

Palm Oil: Production, Processing, Uses, and Characterization Chapter 11 Oil Recovery from Palm Fruits and Palm Kernel Food Science Health Nutrition Biochemistry Processing eChapters Food Science & Technology Health - Nutrition - Biochem

455

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

456

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

457

National Security & Safety Reports | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security & Safety Reports National Security & Safety Reports October 29, 2013 Evaluation Report: IG-0897 The Department of Energy's Unclassified Cyber Security Program -...

458

Security and Performance Considerations in Wireless Networks  

E-Print Network (OSTI)

ACM Workshop on Wireless Security, 2004. [3] ISM Wide-bandTraffic Flows. In Network Security Lab (NSL) Technicalthe Challenges of Security in a Mobile Environment. In

Pelechrinis, Konstantinos

2010-01-01T23:59:59.000Z

459

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

460

Security and United States Immigration Policy  

E-Print Network (OSTI)

Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

Totten, Robbie James

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Visitor_Security_and_Safety_Information  

NLE Websites -- All DOE Office Websites (Extended Search)

in a designated lot near the main lobby and auditorium. Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations United...

462

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

463

Lemnos Interoperable Security Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Program More Documents & Publications SECURITY CORE FUNCTION AND DEFINITION REPORT Lemnos Interoperable Security DOE National SCADA Test Bed Program Multi-Year Plan...

464

Security Orchestration with IF-MAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 7. ...

2012-10-26T23:59:59.000Z

465

Office of Headquarters Security Operations - Headquarters Facilities...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations HomeIntroduction Physical Security Limited Areas and Vault-Type Rooms Personnel Security Foreign Ownership, Control or Influence; Facility...

466

DOE Headquarters Security Quick Reference Book | Navigation  

NLE Websites -- All DOE Office Websites (Extended Search)

TECH. & INFO. SECURITY TEAM HOME COVER | INTRODUCTION SECURITY ACRONYMS TABLE OF CONTENTS HEADQUARTERS SECURITY OFFICER PROTECTIVE FORCE UNCLASSIFIED FOREIGN VISITS & ASSIGNMENTS...

467

Office of Headquarters Security Operations: Headquarters Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

468

Office of Security Operations: Director's Message  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Home Sub Offices HQ Security Officers (HSO) Program Office of Security Operations Office of Information Security Office of...

469

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

470

Enforcement Regulations and Directives - Security | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Regulations and Directives - Security Classified Information Security 10 C.F.R Part 824 - Procedural Rules for the Assessment of Civil Penalties for Classified...

471

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

472

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

9.2.2 Security Interdependence . . . . . . Bounded Control7 Security Constrained Networked Control 7.1Inputs 9 Security Interdependencies for Networked 9.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

473

Global Environmental Change and Human Security  

E-Print Network (OSTI)

with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

Kunnas, Jan

2011-01-01T23:59:59.000Z

474

Security, Emergency Planning & Safety Records | Department of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

475

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... cyber maryLaNd summit. Please NOTE -- Last Updated Wednesday, January 20, 2010. PRESENTATIONS: ... NIST Voting Cyber Security: ...

476

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Special Publication 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security; February ...

477

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... to security control selection and specification considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders ...

478

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and OMB have instituted laws, regulations, and directives that govern ... August 2004, Homeland Security Presidential Directive/Hspd-12 Subject ...

479

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... The PRISMA is based upon existing federal directives including Federal Information Security Management Act (FISMA), NIST guidelines and other ...

480

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... PIV Implementation, Daniel Wood, Treasury; Electricity Subsector Cybersecurity ... Basic Input/Output System (BIOS) Security - Andrew Regenscheid ...

Note: This page contains sample records for the topic "hat kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Georgia Technology Information Security Center (GTISC); Idaho State University National Center of Academic Excellence in Information Assurance: ...

482

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Incident Response. Contingency Planning and Disaster Response; Incident Identification, Reporting, and Response. Back to Top Security Controls. ...

483

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... North Korean nuclear proliferation - using distributed ... in a Collaborative Environment - "to investigate ... can fulfil the current security requirements of ...

484

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... security including, but not limited to: accreditation, audit trails, authorization ... US Department of Energy Computer Incident Advisory Capability (CIAC ...

485

Nuclear Safeguards and Security | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

486

Mathematical treatment of the homogeneous Boltzmann equation for Maxwellian molecules in the presence of singular kernels  

E-Print Network (OSTI)

This paper proves the existence of weak solutions to the spatially homogeneous Boltzmann equation for Maxwellian molecules, when the initial data are chosen from the space of all Borel probability measures on R^3 with finite second moments and the (angular) collision kernel satisfies a very weak cutoff condition. Conservation of momentum and energy is also proved for these weak solutions, without resorting to any boundedness of the entropy.

Emanuele Dolera

2013-06-21T23:59:59.000Z

487

Generation of a novel phase-space-based cylindrical dose kernel for IMRT optimization  

Science Conference Proceedings (OSTI)

Purpose: Improving dose calculation accuracy is crucial in intensity-modulated radiation therapy (IMRT). We have developed a method for generating a phase-space-based dose kernel for IMRT planning of lung cancer patients. Methods: Particle transport in the linear accelerator treatment head of a 21EX, 6 MV photon beam (Varian Medical Systems, Palo Alto, CA) was simulated using the EGSnrc/BEAMnrc code system. The phase space information was recorded under the secondary jaws. Each particle in the phase space file was associated with a beamlet whose index was calculated and saved in the particle's LATCH variable. The DOSXYZnrc code was modified to accumulate the energy deposited by each particle based on its beamlet index. Furthermore, the central axis of each beamlet was calculated from the orientation of all the particles in this beamlet. A cylinder was then defined around the central axis so that only the energy deposited within the cylinder was counted. A look-up table was established for each cylinder during the tallying process. The efficiency and accuracy of the cylindrical beamlet energy deposition approach was evaluated using a treatment plan developed on a simulated lung phantom. Results: Profile and percentage depth doses computed in a water phantom for an open, square field size were within 1.5% of measurements. Dose optimized with the cylindrical dose kernel was found to be within 0.6% of that computed with the nontruncated 3D kernel. The cylindrical truncation reduced optimization time by approximately 80%. Conclusions: A method for generating a phase-space-based dose kernel, using a truncated cylinder for scoring dose, in beamlet-based optimization of lung treatment planning was developed and found to be in good agreement with the standard, nontruncated scoring approach. Compared to previous techniques, our method significantly reduces computational time and memory requirements, which may be useful for Monte-Carlo-based 4D IMRT or IMAT treatment planning.

Zhong Hualiang; Chetty, Indrin J. [Department of Radiation Oncology, Henry Ford Health System, Detroit, Michigan 48202 (United States)

2012-05-15T23:59:59.000Z

488

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

489

An Introduction to Computer Security: the NIST Handbook  

Science Conference Proceedings (OSTI)

An Introduction to Computer Security: the NIST Handbook Keywords: computer security, contingency planning, cryptography, guidance, information assurance, risk management, security audit, security controls, security policy

Barbara Guttman; Edward A. Roback

1995-10-01T23:59:59.000Z

490

Evaluation of sintering effects on SiC incorporated UO2 kernels under Ar and Ar-4%H2 environments  

SciTech Connect

Silicon carbide (SiC) is suggested as an oxygen getter in UO2 kernels used for TRISO particle fuels to lower oxygen potential and prevent kernel migration during irradiation. Scanning electron microscopy and X-ray diffractometry analyses performed on sintered kernels verified that internal gelation process can be used to incorporate SiC in urania fuel kernels. Sintering in either Ar or Ar-4%H2 at 1500 C lowered the SiC content in the UO2 kernels to some extent. Formation of UC was observed as the major chemical phase in the process, while other minor phases such as U3Si2C2, USi2, U3Si2, and UC2 were also identified. UC formation was presumed to be occurred by two reactions. The first was the SiC reaction with its protective SiO2 oxide layer on SiC grains to produce volatile SiO and free carbon that subsequently reacted with UO2 to form UC. The second process was direct UO2 reaction with SiC grains to form SiO, CO, and UC, especially in Ar-4%H2. A slightly higher density and UC content was observed in the sample sintered in Ar-4%H2, but the use of both atmospheres produced kernels with ~95% of theoretical density. It is suggested that incorporating CO in the sintering gas would prevent UC formation and preserve the initial SiC content.

Silva, Chinthaka M [ORNL] [ORNL; Lindemer, Terrence [Harbach Engineering and Solutions] [Harbach Engineering and Solutions; Hunt, Rodney Dale [ORNL] [ORNL; Collins, Jack Lee [ORNL] [ORNL; Terrani, Kurt A [ORNL] [ORNL; Snead, Lance Lewis [ORNL] [ORNL

2013-01-01T23:59:59.000Z

491

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

492

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

493

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Planning and Management DOE M 470.4-1, Chg 2, dated 102010, Safeguards and Security Program Planning and Management Physical Security DOE NAP 70.2, Chg 1, dated 72011,...

494

Security Services Management (Section B)  

Science Conference Proceedings (OSTI)

To take the next step in information security, Security Services Management provides a comprehensive approach to managing people, process, and technology through the sound application of metrics. This book demonstrates how to develop a balanced strategy ...

James S. Tiller

2007-07-01T23:59:59.000Z

495

Security_Walls_VPP_Award  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Force Recognized for Outstanding Safety CARLSBAD, N.M., May 10, 2013 - The U.S. Department of Energy (DOE) has awarded Security Walls, LLC, the Waste Isolation Pilot...

496

Security Ontology for Annotating Resources  

E-Print Network (OSTI)

Abstract. Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ontologies in other domains that focus on annotation of functional aspects of resources. Types of security information that could be described include mechanisms, protocols, objectives, algorithms, and credentials in various levels of detail and specificity. The NRL Security Ontology is more comprehensive and better organized than existing security ontologies. It is capable of representing more types of security statements and can be applied to any electronic resource. The class hierarchy of the ontology makes it both easy to use and intuitive to extend. We applied this ontology to a Service Oriented Architecture to annotate security aspects of Web service descriptions and queries. A refined matching algorithm was developed to perform requirement-capability matchmaking that takes into account not only the ontology concepts, but also the properties of the concepts. 1

Anya Kim; Jim Luo; Myong Kang

2005-01-01T23:59:59.000Z

497

Climate Change and National Security  

Science Conference Proceedings (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communitieswith resultant advantages and differences. Climate change research has ...

Elizabeth L. Malone

2013-01-01T23:59:59.000Z

498

Departmental Personnel Security- Clearance Automation  

Energy.gov (U.S. Department of Energy (DOE))

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

499

Security Aspects of Electronic Voting  

Science Conference Proceedings (OSTI)

Security Aspects of Electronic Voting. Summary: The Help America Vote Act (HAVA) of 2002 was passed by Congress to ...

2013-08-01T23:59:59.000Z

500

Department of Homeland Security Workshop  

Science Conference Proceedings (OSTI)

Homeland Security Modeling and Simulation Workshop. Purpose: This workshop is a joint effort of US Department of Homeland ...

2011-06-14T23:59:59.000Z