National Library of Energy BETA

Sample records for home security systems

  1. Determining Home Range and Preferred Habitat of Feral Horses on the Nevada National Security Site Using Geographic Information Systems

    SciTech Connect (OSTI)

    Burns, Ashley V.

    2014-05-30

    Feral horses (Equus caballus) are free-roaming descendants of domesticated horses and legally protected by the Wild and Free-Roaming Horses and Burros Act of 1971, which mandates how feral horses and burros should be managed and protected on federal lands. Using a geographic information system to determine the home range and suitable habitat of feral horses on the federally managed Nevada National Security Site can enable wildlife biologists in making best management practice recommendations. Home range was estimated at 88.1 square kilometers. Site suitability was calculated for elevation, forage, slope, water presence and horse observations. These variables were combined in successive iterations into one polygon. Suitability rankings established that 85 square kilometers are most suitable habitat, with 2,052 square kilometers of good habitat 1,252 square kilometers of fair habitat and 122 square kilometers of least suitable habitat.

  2. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  3. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  4. Wireless Security in the Home and Office Environment

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Wireless Security in the Home and Office Environment Michel Barbeau School of Computer Science, 2010 Abstract The ubiquity of wireless communications, in the home and office environment, introduces, to the security of wireless communications, that are real and the ones that are inoffensive. Examples related

  5. PIA - Northeast Home Heating Oil Reserve System (Heating Oil...

    Energy Savers [EERE]

    Home Heating Oil Reserve System (Heating Oil) More Documents & Publications PIA - WEB Physical Security Major Application PIA - GovTrip (DOE data) PIA - WEB Unclassified...

  6. Home construction | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault SignEnergy ScoreHome and

  7. IntuiSec : a framework for intuitive user interaction with security in the smart home

    E-Print Network [OSTI]

    Shakhshir, Saad Zafer

    2007-01-01

    This thesis presents IntuiSec, a framework for intuitive user interaction with Smart Home security. The design approach of IntuiSec is to introduce a layer of indirection between user-level intent and the system-level ...

  8. Power Systems Group Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Systems Division Search APS ... Search Button About ASD General Information ASD Groups ESHQA Operations Argonne Home > Advanced Photon Source > Power Systems Group This page is...

  9. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  10. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  11. Composition of Management System for Smart Homes

    E-Print Network [OSTI]

    Levin, Mark Sh; Klapproth, Alexander

    2011-01-01

    The paper addresses modular hierarchical design (composition) of a management system for smart homes. The management system consists of security subsystem (access control, alarm control), comfort subsystem (temperature, etc.), intelligence subsystem (multimedia, houseware). The design solving process is based on Hierarchical Morphological Multicriteria Design (HMMD) approach: (1) design of a tree-like system model, (2) generation of design alternatives for leaf nodes of the system model, (3) Bottom-Up process: (i) multicriteria selection of design alternatives for system parts/components and (ii) composing the selected alternatives into a resultant combination (while taking into account ordinal quality of the alternatives above and their compatibility). A realistic numerical example illustrates the design process of a management system for smart homes.

  12. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  13. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  14. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  15. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  16. Situated Usability Testing for Security Systems

    SciTech Connect (OSTI)

    Greitzer, Frank L.

    2011-03-02

    While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

  17. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  18. Developing Secure Power Systems Professional Competence: Alignment...

    Energy Savers [EERE]

    Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems...

  19. Control Systems Security Standards: Accomplishments And Impacts...

    Broader source: Energy.gov (indexed) [DOE]

    that need to be made toward meeting the priority strategies defined in the DOEDHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards:...

  20. Control Systems Security Publications Library | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Metrics for Process Control Systems - September 2007 Security Framework for Control System Data Classification and Protection - July 2007 Secure ICCP Integration...

  1. Cyber Securing Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based| Department of Energy Whole-HomeCutting Edge Building5 by ISA -

  2. Securing Control Systems Modems

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLE DIRECTIVES Pursuant to the contract clauseProgram (WP) |

  3. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  4. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  5. Recommended Security Controls for Federal Information Systems...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines (Derived From Appendix F) Minimum Requirements: FedRamp Security Controls...

  6. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  7. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    myths and facts behind cyber security risks for industrialJ. and Hieb, J. [2007], Cyber security risk assessment forOn Cyber Security for Networked Control Systems by Saurabh

  8. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y. (Rochester, MN)

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  9. Home Heating Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof Energy ServicesContracting OversightEMSHome EnergyHeating Systems Home

  10. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems

    E-Print Network [OSTI]

    Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems for information systems. Traditionally, security is considered after the definition of the system. However the health sector to military. As the use of Information Systems arises, the demand to secure those systems

  11. Physical Security Systems | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/OPerformance andAreaPhotoinducedCenter ObjectivePhysical

  12. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

  13. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  14. Early Oak Ridge Trailer Home | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansas Nuclear Profile 2010Mesoscopy andSaving on Fuel The-EarlyHome Early Oak

  15. Early Oak Ridge Trailer Homes | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansas Nuclear Profile 2010Mesoscopy andSaving on Fuel The-EarlyHome Early

  16. Evaluating Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, Robb; Arena, Lois

    2013-02-01

    In an effort to improve housing options near Las Vegas, Nevada, the Clark County Community Resources Division (CCCRD) performs substantial renovations to foreclosed homes. After dramatic energy, aesthetic, and health and safety improvements are made, homes are rented or sold to qualified residents. This report describes the evaluation and selection of ventilation systems for these homes, including key considerations when selecting an ideal system. The report then describes CCCRDs decision process with respect to ventilation.

  17. Trailer homes in Oak Ridge | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S.Week DayDr.Theories81TowardsTracking Living

  18. Early Oak Ridge Home | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansas Nuclear Profile 2010Mesoscopy andSaving on Fuel The-Early

  19. Roadmap to Secure Control Systems in the Energy Sector - January...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy Sector - January 2006 Roadmap to Secure Control Systems in the Energy Sector - January 2006 This document, the Roadmap to Secure...

  20. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    of cryptography as it relates to the computer security industry. We will look at some of the underlying technologyIBM Internet Security Systems X-Force Threat Insight Monthly www.iss.netwww.iss.net September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force Threat Insight Monthly

  1. Breaking parameter modulated chaotic secure communication system

    E-Print Network [OSTI]

    G. Alvarez; F. Montoya; M. Romera; G. Pastor

    2003-11-20

    This paper describes the security weakness of a recently proposed secure communication method based on parameter modulation of a chaotic system and adaptive observer-based synchronization scheme. We show that the security is compromised even without precise knowledge of the chaotic system used.

  2. Pantex Occupational Health System (OHS), National Nuclear Security...

    Energy Savers [EERE]

    Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security...

  3. The National Security Policy Process: The National Security Council and Interagency System

    E-Print Network [OSTI]

    Huang, Wei

    The National Security Policy Process: The National Security Council and Interagency System By Alan Update: August 15, 2011 #12;THIS PAGE INTENTIONALLY BLANK 2 #12;Table of Contents The National Security Policy Process: The National Security Council and Interagency System

  4. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  5. NREL: Energy Systems Integration Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof EnergyY-12Working withPhoto of the Energy Systems

  6. Planning a Home Solar Electric System

    Broader source: Energy.gov [DOE]

    Should you install a solar electric system? Whether a home solar electric system will work for you depends on the available sun (resource), available space for the system size you need, the economics of the investment, and the local permits required.

  7. Providing Security With Insecure Systems Andrew Odlyzko

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    not caused by cyberinsecurity. Even taking the crash into account, the world economy has been doing veryProviding Security With Insecure Systems Andrew Odlyzko School of Mathematics, University: Security, Economics, Human Factors Extended Abstract A Martian who arrived on Earth today would surely con

  8. Motivation to study security of control systems. Our Results/Contribution. Summary. Security constrained control under

    E-Print Network [OSTI]

    Hu, Fei

    Motivation to study security of control systems. Our Results/Contribution. Summary. Security Secure control systems UC Berkeley #12;Motivation to study security of control systems. Our Results/Contribution. Summary. Outline. Motivation to study security of control systems. Distributed control systems

  9. NREL: Wind Research - Systems Engineering Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines lightGeospatialDevelopment of Marine andDrivetrainsNewSiteSystems

  10. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Securitys Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSPs current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  11. Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?

    E-Print Network [OSTI]

    Qin, Xiao

    Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

  12. Secure videoconferencing equipment switching system and method

    DOE Patents [OSTI]

    Hansen, Michael E. (Livermore, CA)

    2009-01-13

    A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

  13. NNSA sites take home 15 R&D Awards | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof EnergyY-12 National Security Complex

  14. USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY

    E-Print Network [OSTI]

    USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY Shirley about the security of information systems for the decision makers of organizations. When organizations to strengthen the overall security of their information and their information systems. Organizations

  15. Towards a Secure, Wireless-Based, Home Area Network for Metering in Smart Grids

    E-Print Network [OSTI]

    Namboodiri, Vinod

    1 Towards a Secure, Wireless-Based, Home Area Network for Metering in Smart Grids Vinod Namboodiri, Student Member, IEEE, Ward Jewell, Fellow, IEEE Abstract--Compared to the conventional grid, the smart (AMI), commonly known as the smart meter, which has the capability of supporting various functions

  16. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  17. Recommended Practice for Securing Control System Modems

    SciTech Connect (OSTI)

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked backdoor into critical infrastructure control systems created by modem connections. A modems connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  18. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  19. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Broader source: Energy.gov (indexed) [DOE]

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE More Documents & Publications PIA - INL Education Programs...

  20. Roadmap to Secure Control Systems in the Energy: Executive Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to...

  1. Security Framework for Control System Data Classification and...

    Broader source: Energy.gov (indexed) [DOE]

    Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  2. Secure videoconferencing equipment switching system and method

    DOE Patents [OSTI]

    Dirks, David H; Gomes, Diane; Stewart, Corbin J; Fischer, Robert A

    2013-04-30

    Examples of systems described herein include videoconferencing systems having audio/visual components coupled to a codec. The codec may be configured by a control system. Communication networks having different security levels may be alternately coupled to the codec following appropriate configuration by the control system. The control system may also be coupled to the communication networks.

  3. Planning for Home Renewable Energy Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Planning for Home Renewable Energy Systems Planning for Home Renewable Energy Systems November 4, 2014 - 8:49pm Addthis Planning for a home renewable energy system is a process...

  4. DOE Challenge Home Case Study, Clifton View Homes, Coupeville, WA, Systems Home

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuel Cycle | Department of Energy DOE Awards UpClifton View Homes

  5. Physical Security System Sensitivity to DBT Perturbations

    E-Print Network [OSTI]

    Conchewski, Curtis

    2012-10-19

    This thesis examines how perturbing selected adversary capabilities in a design basis threat (DBT) may affect the assessment of a facility's security system performance. We found that using a strictly defined DBT to design ...

  6. Security approaches for Radio Frequency Identification systems

    E-Print Network [OSTI]

    Foley, Joseph Timothy, 1976-

    2007-01-01

    In this thesis, I explore the challenges related to the security of the Electronic Product Code (EPC) class of Radio Frequency Identification (RFID) tags and associated data. RFID systems can be used to improve supply chain ...

  7. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction Madisetti, 06/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Tutorial Outline Objectives & Introduction: C&A Information Security Certification & Accreditation Foundations (as

  8. ISMS for Microsoft's Cloud Infrastructure 1 Information Security Management System

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    ISMS for Microsoft's Cloud Infrastructure 1 Information Security Management System for Microsoft's Cloud Infrastructure Online Services Security and Compliance Executive summary This paper describes the Microsoft Cloud Infrastructure and Operations (MCIO) Information Security Management System (ISMS) program

  9. Electronic DOE Information Security System (eDISS) PIA, Office...

    Energy Savers [EERE]

    Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and...

  10. Secure and Efficient Routable Control Systems

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

    2010-05-01

    This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

  11. Webinar: ENERGY STAR Hot Water Systems for High Performance Homes...

    Energy Savers [EERE]

    Webinar: ENERGY STAR Hot Water Systems for High Performance Homes Webinar: ENERGY STAR Hot Water Systems for High Performance Homes This presentation is from the Building America...

  12. Northeast Home Heating Oil Reserve System Heating Oil, PIA Office...

    Broader source: Energy.gov (indexed) [DOE]

    Northeast Home Heating Oil Reserve System Heating Oil, PIA Office of Fossil Energy Headquaters Northeast Home Heating Oil Reserve System Heating Oil, PIA Office of Fossil Energy...

  13. When security meets software engineering: A case of modelling secure information systems

    E-Print Network [OSTI]

    When security meets software engineering: A case of modelling secure information systems Engineering: towards the Modeling of Secure Information Systems" paper presented at the 15th International. This is mainly because private information is stored in computer systems and without security, organisations (and

  14. Systems for home automation are a necessary component for intelligent smart homes applications.

    E-Print Network [OSTI]

    Dobson, Simon

    developers in the process of building applications for the smart home, providing them with informationAbstract Systems for home automation are a necessary component for intelligent smart homes. Introduction Whilst a number of automation systems for smart homes are available commercially, their use

  15. The Secure Hash Payment System

    E-Print Network [OSTI]

    Thompson, Timothy J

    2001-01-01

    to be developed. Today, consumers are required to provide their complete credit card information to a merchant to complete a transaction, which requires trust in the merchant and the merchant's security. While this approach is widely available and used, it does...

  16. HR System Access Request Form Security Administration, Human Resources (HR) For additional instructions and information, log onto http://hr.vanderbilt.edu/security/

    E-Print Network [OSTI]

    Simaan, Nabil

    instructions and information, log onto http://hr.vanderbilt.edu/security/ Home Department VUnet IDHR EmployeeHR System Access Request Form Security Administration, Human Resources (HR) For additional ID Name Email AddressWork Phone Home Dept Name Effective Date of Access Operator Information I

  17. Home Cooling Systems | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home cooling accounts for 6 percent of the average household's energy use. To help you save money by saving energy, our experts are answering your home cooling questions. |...

  18. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  19. Senior Systems Engineer | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal ofNational Nuclear SecuritySecurityriver

  20. Center for Control System Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAudits &BradburyMay 1,Center OrganizationInfrared Metamaterials and

  1. Cloud Computing Security in Business Information Systems

    E-Print Network [OSTI]

    Ristov, Sasko; Kostoska, Magdalena

    2012-01-01

    Cloud computing providers' and customers' services are not only exposed to existing security risks, but, due to multi-tenancy, outsourcing the application and data, and virtualization, they are exposed to the emergent, as well. Therefore, both the cloud providers and customers must establish information security system and trustworthiness each other, as well as end users. In this paper we analyze main international and industrial standards targeting information security and their conformity with cloud computing security challenges. We evaluate that almost all main cloud service providers (CSPs) are ISO 27001:2005 certified, at minimum. As a result, we propose an extension to the ISO 27001:2005 standard with new control objective about virtualization, to retain generic, regardless of company's type, size and nature, that is, to be applicable for cloud systems, as well, where virtualization is its baseline. We also define a quantitative metric and evaluate the importance factor of ISO 27001:2005 control objecti...

  2. Home Energy Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy Resources JumpNew Jersey: EnergyHollyHoma Hills, Wyoming:

  3. Home Cooling Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof Energy ServicesContracting OversightEMS

  4. Analytical foundations of physical security system assessment

    E-Print Network [OSTI]

    Graves, Gregory Howard

    2006-10-30

    . 1. Physical Security Design Process Conventional decision problems under conditions of uncertainty require a specified probability measure on the sigma-algebra generated by a set of atomic events or outcomes. In this research, we consider the problem... security system, our model represents the consequences of threat actions in terms of a random variable representing reward. We characterize atomic events using random variables representing magnitude of loss to the assets and specific types of threat...

  5. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and security management to enable energy asset owners to design a secure, networked control systems architecture. The project is led by Siemens Corporate Research in partnership...

  6. Security system helps utility stay competitive

    SciTech Connect (OSTI)

    NONE

    1995-04-01

    Atlantic Electric is saving more than $750,000 annually in security costs by using an innovative closed-circuit television (CCTV) system to guard its remote sites electronically. Today, a single guard in the central security control room at Atlantic Electric`s headquarters electronically surveys and controls some 20 remote sites such as combustion turbine sites, material storage, administrative facilities and operating centers. Protecting these sites are CCTV cameras mounted around each yard, floodlighting, and a motion detection and signal transmission system called Adpro SiteWatch by vsion Systems Inc. The SiteWatch system automatically displays to the central guard any intrusion at a site, and captures and replays the intrusion events similar to an instant replay in a televised sporting event. Over the five year transition, Atlantic Electric saved nearly $2 million in security costs.

  7. Design tools for complex dynamic security systems.

    SciTech Connect (OSTI)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III; Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  8. Home Cooling Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fans In many climates, you can use a whole-house fan to meet all or most of your home cooling needs. Evaporative Cooling For homes in dry climates, evaporative cooling or...

  9. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  10. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  11. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  12. Home Heating Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A variety of technologies are available for heating your house. In addition to heat pumps, which are discussed separately, many homes use the following approaches:...

  13. Home Heating Systems | Department of Energy

    Office of Environmental Management (EM)

    separately, many homes use the following approaches: Active Solar Heating Uses the sun to heat either air or liquid and can serve as a supplemental heat source. Electric...

  14. The Center for Information Systems Security Studies and

    E-Print Network [OSTI]

    The Center for Information Systems Security Studies and Research (CISR) has created the ISSE) and the Department of Homeland Security (DHS) have designated NPS as a Center of Academic Excellence in Information developments where cyber security is a concern. Information Systems Security Engineering (ISSE) Certificate

  15. Improving Energy Efficiency and Security for Disk Systems

    E-Print Network [OSTI]

    Qin, Xiao

    Improving Energy Efficiency and Security for Disk Systems Shu Yin1 , Mohammed I. Alghamdi2 been focused on data security and energy efficiency, most of the existing approaches have concentrated optimization with security services to enhance the security of energy-efficient large- scale storage systems

  16. Cyber-Physical Systems Security for Smart Grid

    E-Print Network [OSTI]

    Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy

  17. Comparison of Routable Control System Security Approaches

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  18. Chapter 5. System security and ancillary Introduction

    E-Print Network [OSTI]

    Ernst, Damien

    Chapter 5. System security and ancillary services 1 #12;Introduction Markets for electrical energy of the other. 4 #12;Describing the needs for ancillary services Needs classified according to three different. Interactions for example between balancing and network issues. Ancillary services needed for addressing every

  19. NREL: Energy Systems Integration Facility Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNREL gets $20M Insights

  20. NREL: Energy Systems Integration Facility Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of rare Kaonforsupernovae model (Journal AboutContent Skip toNREL | Energy

  1. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS, Hanover, NH,on the Economics of Information Security. Anderson, R. and

  2. Home Energy Management Systems and Reduced Consumption

    Broader source: Energy.gov [DOE]

    This presentation was given at the Summer 2012 DOE Building America meeting on July 25, 2012, and addressed the question "What emerging innovations are the key to future homes?"

  3. Tracking Systems for Multiple Smart Home Aaron S. Crandall

    E-Print Network [OSTI]

    Cook, Diane J.

    Tracking Systems for Multiple Smart Home Residents Aaron S. Crandall acrandal@wsu.edu Diane J. Cook cook@eecs.wsu.edu March 29, 2011 Abstract Once a smart home system moves to a multi-resident situation and acted on inde- pendently by other tools within the smart home system. This process improves activity

  4. Remote-Controlled Home Automation Systems with Different Network Technologies

    E-Print Network [OSTI]

    Davies, John N.

    Remote-Controlled Home Automation Systems with Different Network Technologies Armando Roy Delgado into the potential for remote controlled operation of home automation systems. It considers problems, 2002) which certainly requires a careful study before developing any suitable Home Automation System

  5. Roadmap to Secure Control Systems in the Energy Sector 2006 ...

    Energy Savers [EERE]

    Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation...

  6. Fair and Efficient Secure Multiparty Computation with Reputation Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Fair and Efficient Secure Multiparty Computation with Reputation Systems Gilad Asharov, Yehuda majority are not obtained. Keywords: secure multiparty computation, reputation systems, new models 1 Lindell, and Hila Zarosim Dept. of Computer Science, Bar-Ilan University, Israel {asharog

  7. Cryptanalyzing a discrete-time chaos synchronization secure communication system

    E-Print Network [OSTI]

    Gonzalo Alvarez; Fausto Montoya; Miguel Romera; Gerardo Pastor

    2003-11-21

    This paper describes the security weakness of a recently proposed secure communication method based on discrete-time chaos synchronization. We show that the security is compromised even without precise knowledge of the chaotic system used. We also make many suggestions to improve its security in future versions.

  8. DOE Zero Energy Ready Home Case Study, Weiss Building & Development, LLC., System Home, River Forest, Illinois

    SciTech Connect (OSTI)

    none,

    2013-09-01

    The Passive House Challenge Home located in River Forest, Illinois, is a 5-bedroom, 4.5-bath, 3,600 ft2 two-story home (plus basement) that costs about $237 less per month to operate than a similar sized home built to the 2009 IECC. For a home with no solar photovoltaic panels installed, it scored an amazingly low 27 on the Home Energy Rating System (HERS) score.An ENERGY STAR-rated dishwasher, clothes washer, and refrigerator; an induction cooktop, condensing clothes dryer, and LED lighting are among the energy-saving devices inside the home. All plumbing fixtures comply with EPA WaterSense criteria. The home was awarded a 2013 Housing Innovation Award in the "systems builder" category.

  9. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  10. SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Estimators in SCADA systems is scrutinized. Index Terms--Cyber-Security, SCADA Systems, AGC, State Estimators in our society [1]. Large power systems are nowadays very complex and tightly coupled with the SCADA

  11. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  12. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland View

  13. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drive Laboratory62

  14. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drive Laboratory62default

  15. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drive

  16. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drivedefault Sign In About |

  17. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drivedefault Sign In About

  18. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drivedefault Sign In

  19. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drivedefault Sign InPlan

  20. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drivedefault Sign

  1. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drivedefault Signdefault

  2. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drivedefault

  3. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drivedefaultdefault Sign In

  4. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drivedefaultdefault Sign

  5. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drivedefaultdefault

  6. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food Drivedefaultdefaultdefault

  7. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday Food

  8. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday FoodPages default Sign In About |

  9. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday FoodPages default Sign In About

  10. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday FoodPages default Sign In

  11. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday FoodPages default Sign In NNSA

  12. Security needs in embedded systems Tata Elxsi Ltd. India

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Security needs in embedded systems Anoop MS Tata Elxsi Ltd. India anoopms will be useless #12;Security needs in embedded systems 2 or unintelligible for anyone who is having unauthorized in an embedded system to achieve data security is explained in the following sections. 2.1. Data Encryption

  13. Information Security and Computer Systems: An Integrated Approach

    E-Print Network [OSTI]

    Holliday, Mark A.

    Information Security and Computer Systems: An Integrated Approach Mark A. Holliday Dept in information security that build upon concepts the students will already have seen in their computer systems this integrated approach to information security and computer systems. Categories and Subject Descriptors D.4

  14. Hydra: A Platform for Survivable and Secure Data Storage Systems

    E-Print Network [OSTI]

    Xu, Lihao

    Hydra: A Platform for Survivable and Secure Data Storage Systems Lihao Xu Dept. of Computer Science are devel- oping for highly survivable and secure data storage systems that distribute information over on user data. We also explore Hydra's applications in survivable and secure data storage systems

  15. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vendor has issued a fix: 1. Cisco Secure ACS version 5.1: File 5-1-0-44-6.tar.gpg - ACS 5.1.0.44 cumulative patch 6 2. Cisco Secure ACS version 5.2: File...

  16. Explaining The Operation of A Home Care System

    E-Print Network [OSTI]

    Turner, Ken

    (e.g. for communication, speech input-output, or weather forecasts). A home care system is able are living normally at home. For example, non-intrusive sensing can confirm that the individual is sleepingExplaining The Operation of A Home Care System Kenneth J. Turner, Computing Science and Mathematics

  17. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nations critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  18. Ultra Safe And Secure Blasting System

    SciTech Connect (OSTI)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  19. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Treaty Verification Nuclear Systems Modeling, Simulation & Validation Nuclear Systems Technology Reactor Technology Nuclear Science Home | Science & Discovery |...

  20. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeat Pumps Heat Pumps AnAbout Energy.gov »Public Comments Pages

  1. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeat Pumps Heat Pumps AnAbout Energy.gov »Public Comments

  2. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeat Pumps Heat Pumps AnAbout Energy.gov »Public Commentsdefault

  3. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of rare Kaonforsupernovae model (Journal About DOE ButtonFSOWiki

  4. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of rare Kaonforsupernovae model (Journal About DOE ButtonFSOWikiDonald

  5. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland View school4-TP59.01vacuumEnergyTechnology

  6. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In About | Careers | Contact

  7. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In About | Careers |

  8. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In About | Careers |default

  9. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In About | Careers

  10. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In About | Careersdefault

  11. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In About |

  12. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In About |default Sign In

  13. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In About |default Sign

  14. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In About |default

  15. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In About |defaultdefault

  16. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In About

  17. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In Aboutdefault Sign In

  18. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In Aboutdefault Sign InPages

  19. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In Aboutdefault Sign

  20. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In Aboutdefault Signdefault

  1. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In Aboutdefault

  2. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In Aboutdefaultdefault Sign

  3. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In Aboutdefaultdefault

  4. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In AboutdefaultdefaultATC

  5. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign In

  6. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign InInterconnection Pages

  7. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault Sign InInterconnection

  8. Measure Guideline: Selecting Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, R.

    2014-02-01

    This document addresses adding -or improving - mechanical ventilation systems to existing homes. The purpose of ventilation is to remove contaminants from homes, and this report discusses where, when, and how much ventilation is appropriate in a home, including some discussion of relevant codes and standards. Advantages, disadvantages, and approximate costs of various system types are presented along with general guidelines for implementing the systems in homes. CARB intends for this document to be useful to decision makers and contractors implementing ventilation systems in homes. Choosing the "best" system is not always straightforward; selecting a system involves balancing performance, efficiency, cost, required maintenance, and several other factors. It is the intent of this document to assist contractors in making more informed decisions when selecting systems. Ventilation is an integral part of a high-performance home. With more air-sealed envelopes, a mechanical means of removing contaminants is critical for indoor environmental quality and building durability.

  9. Evaluating Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, R.; Arena, L.

    2013-02-01

    During the course of this project, an affordable and high performance ductwork system to directly address the problems of thermal losses, poor efficiency, and air leakage was designed. To save space and enable direct connections between different floors of the building, the ductwork system was designed in such a way that it occupied interior or exterior frame wall cavities. The ductwork system satisfied building regulations for structural support when bridging multiple floors, the spread of fire and smoke, and insulation to reduce the heat flow into or out of the building. Retrofits of urban residential buildings will be the main focus for the application of this ductwork system. Highly reflective foils and insulating materials were used to aid in the increase of the overall R-value of the ductwork itself and the wall assembly. It is expected that the proposed system will increase the efficiency of the HVAC system and the thermal resistance of the building envelope. The performance of the proposed ductwork design was numerically evaluated in a number of different ways. Our results indicate that the duct method is a very cost attractive alternative to the conventional method.

  10. Triggering Control Methods for Cyber-Physical Systems : : Security & Smart Grid Applications

    E-Print Network [OSTI]

    Foroush, Hamed Shisheh

    2014-01-01

    applications, e.g. , security and smart grid, and on theCyber-Physical Systems: Security & Smart Grid Applications APhysical Systems: Security & Smart Grid Applications by

  11. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of electric grid security under terrorist threat,and a guideline to smart grid security in NIST-IR 7628. Al-the current security posture of the power grid, (2) develop

  12. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of the systems still in use today were designed to operate in closed, proprietary networks. National SCADA Test Bed - Enhancing control systems security in the energy sector...

  13. Effects of Home Energy Management Systems on Distribution Utilities...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Effects of Home Energy Management Systems on Distribution Utilities and Feeders under Various Market Structures Preprint Mark Ruth, Annabelle Pratt, Monte Lunacek, Saurabh Mittal,...

  14. Home Energy Scoring Systems, Call Slides and Discussion Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    March 28, 2013 Better Buildings Neighborhood Program Data & Evaluation Peer Exchange Call: Using Home Energy Scoring Systems Agenda * Call Logistics and Attendance * Discussion ...

  15. Installing and Maintaining a Home Solar Electric System | Department...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    | Photo courtesy of Dennis Schroeder, NREL. Making sure your home solar electric or photovoltaic (PV) system is sized, sited, installed, and maintained correctly is essential...

  16. Installing and Maintaining a Home Solar Electric System | Department...

    Energy Savers [EERE]

    Making sure your home solar electric or photovoltaic (PV) system is sized, sited, installed, and maintained correctly is essential for maximizing its energy performance. When...

  17. S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems

    E-Print Network [OSTI]

    Mohan, Sibin; Betti, Emiliano; Yun, Heechul; Sha, Lui; Caccamo, Marco

    2012-01-01

    Until recently, cyber-physical systems, especially those with safety-critical properties that manage critical infrastructure (e.g. power generation plants, water treatment facilities, etc.) were considered to be invulnerable against software security breaches. The recently discovered 'W32.Stuxnet' worm has drastically changed this perception by demonstrating that such systems are susceptible to external attacks. Here we present an architecture that enhances the security of safety-critical cyber-physical systems despite the presence of such malware. Our architecture uses the property that control systems have deterministic execution behavior, to detect an intrusion within 0.6 {\\mu}s while still guaranteeing the safety of the plant. We also show that even if an attack is successful, the overall state of the physical system will still remain safe. Even if the operating system's administrative privileges have been compromised, our architecture will still be able to protect the physical system from coming to harm.

  18. T-592: Cisco Security Advisory: Cisco Secure Access Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing ToolInternational Affairs, Before theFebruary 1,7/109 HistoricalResources |Unauthorized

  19. Selection of Model in Developing Information Security Criteria for Smart Grid Security System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01

    At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

  20. Proposed platform for improving grid security by trust management system

    E-Print Network [OSTI]

    Siadat, Safieh; Mohsenzadeh, Mehran

    2009-01-01

    With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecting one service provider which has closest adaption with user requests and using from domains security attribute as an important factor in computing the trust value.

  1. Guideline for Identifying an Information System as a National Security System

    E-Print Network [OSTI]

    Guideline for Identifying an Information System as a National Security System NIST Special Publication 800-59 Guideline for Identifying an Information System as a National Security System William C;Guideline for Identifying an Information System as a National Security System Reports on Computer Systems

  2. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IQ Station Boise State University receives a portable 3D visualization system from CAES and INL More BSU Photo of the Week INL's Shane Grover drives the IQ Station...

  3. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect (OSTI)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  4. Help for the Developers of Control System Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  5. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratorys (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  6. DOE and Industry Showcase New Control Systems Security Technologies...

    Energy Savers [EERE]

    based on open-source specifications that enables secured interoperability among energy control systems devices. This interoperable capability was also demonstrated in a...

  7. A Summary of Control System Security Standards Activities in...

    Office of Environmental Management (EM)

    security topic. This work focuses on control systems standards applicable to the energy (oil, gas, and electric, but not nuclear) sector. Summary of CS Standards Activities in the...

  8. Plutonium finishing plant safeguards and security systems replacement study

    SciTech Connect (OSTI)

    Klear, P.F.; Humphrys, K.L.

    1994-12-01

    This document provides the preferred alternatives for the replacement of the Safeguards and Security systems located at the Hanford Plutonium Finishing Plant.

  9. Cyber-Physical Systems Security for Smart Grid

    E-Print Network [OSTI]

    Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy Acknowledgements This white paper was developed as one of nine white papers in the project "The Future Grid

  10. Techniques for Securing Substation Automation Systems David Guidry1

    E-Print Network [OSTI]

    Burmester, Mike

    that such systems are properly secured. Most critical infrastructures such as the electricity grid can be modeled be modeled as cyber-physical systems whose cyber components control the underlying physical components so propose techniques for resilient substation automation of power utility systems with security based

  11. A Wireless Human Motion Capturing System for Home Rehabilitation

    E-Print Network [OSTI]

    Tseng, Yu-Chee

    A Wireless Human Motion Capturing System for Home Rehabilitation Yu-Chee Tseng, Chin-Hao Wu, Fang the use of intelligent sensors to capture human motions for home rehabilitation. We design a game to help a patient to conduct his/her rehabilitation program. For each exercise, the patient is instructed to wear

  12. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect (OSTI)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  13. Northeast Home Heating Oil Reserve- Online Bidding System

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy has developed an on-line bidding system - an anonymous auction program - for the sale of product from the one million barrel Northeast Home Heating Oil Reserve.

  14. Measure Guideline: Selecting Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, R.

    2014-02-01

    This report, developed by Building America research team CARB, addresses adding or improving mechanical ventilation systems to existing homes. The goal of this report is to assist decision makers and contractors in making informed decisions when selecting ventilation systems for homes. With more air-sealed envelopes, a mechanical means of removing contaminants is critical for indoor environmental quality and building durability. The purpose of ventilation is to remove contaminants from homes, and this report discusses where, when, and how much ventilation is appropriate in a home, including examination of relevant codes and standards. Choosing the "best" system is not always straightforward; selecting a system involves balancing performance, efficiency, cost, required maintenance, and several other factors.

  15. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  16. Secure control systems with application to cyber-physical systems

    SciTech Connect (OSTI)

    Dong, Jin; Djouadi, Seddik M; Nutaro, James J; Kuruganti, Phani Teja

    2014-01-01

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  17. Presentation to the Control Systems Security Outreach Coordination Meeting

    E-Print Network [OSTI]

    23% Oil/Gas 18% Nuclear 17% Chemical 6% Water 6% Manufacturing 2% Transportation/Shipping 2% Natural Gas 1% 0 20 40 60 80 100 120 Low Med High Control Systems Cyber Security Experience Levels #12Presentation to the Control Systems Security Outreach Coordination Meeting Presentation

  18. On Cyber Security for Networked Control Systems Saurabh Amin

    E-Print Network [OSTI]

    random failures and secu- rity attacks. Cyber-security of Supervisory Control and Data Acquisition (SCADA, cyber-security assessment for SCADA systems is performed based on well-defined attacker and defender objectives. The mathematical model of SCADA systems considered in this work has two control levels

  19. Cyber-Security of Networked Control Systems Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    7/3/12 1 Cyber-Security of Networked Control Systems Karl Henrik Johansson #12;7/3/12 2 Recent Cyber-ARacks on Control Systems Cyber-Security of Networked to cyber-threats with many poten@al points of aRacks How

  20. Security and Survivability in Unbounded Networked Systems Axel Krings*

    E-Print Network [OSTI]

    Krings, Axel W.

    security and survivability concerns are often equated with applying certain maintenance operations, e.g., frequent operating system updating, subscription to filtering software like virus checkers and spam filters and intrusion tolerance, and economic or statistical modeling of secure/survivable systems. We are very pleased

  1. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  2. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect (OSTI)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nations current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  3. Home Production and Social Security Reform Michael Dotsey Wenli Li Fang Yangy

    E-Print Network [OSTI]

    Alexandrova, Ivana

    erentiates both consumption goods and labor eort according to their respective roles in home production that a carefully calibrated model with home production better matches life cycle consumption and labor pro of disaggregating consumption goods based on whether they can be produced at home, because home production

  4. An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California

    E-Print Network [OSTI]

    Hoen, Ben

    2011-01-01

    Residential Photovoltaic Energy Systems on Home Sales PricesResidential Photovoltaic Energy Systems on Home Sales Prices

  5. Securing Wide Area Measurement Systems | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLE DIRECTIVES Pursuant to the contract clauseProgram (WP) |Securing

  6. Model-based Security Risk Analysis for Networked Embedded Systems

    E-Print Network [OSTI]

    . The Security-Enhanced Embedded system Development (SEED) process has proposed a set of tools that a bridge are illustrated in a smart metering infrastructure scenario. 1 Introduction Meeting the security needs. The forthcoming vehicular networks and smart grid infrastructures are examples of such a technological development

  7. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    SciTech Connect (OSTI)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  8. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect (OSTI)

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

  9. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  10. 2010 Graduate, Computer Information Systems Home Town: Alexandria, LA

    E-Print Network [OSTI]

    Selmic, Sandra

    2010 Graduate, Computer Information Systems Home Town: Alexandria, LA Anthony Helms Exxon Mobil graduating and what you are doing now. I have been with ExxonMobil for almost 5 years. Since I started, I and implementations. My favorite part of working at ExxonMobil is having the opportunity to progress my career

  11. Security Requirements for Classified Automatic Data Processing Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1985-07-10

    To establish and describe the computer security program for classified automatic data processing (ADP) systems at the Department of Energy (DOE) Headquarters. This directive does not cancel another directive. Canceled by DOE N 251.9.

  12. Homeland Security Challenges Facing Small Water Systems in Texas

    E-Print Network [OSTI]

    Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

    2007-05-31

    threats that they face. EPA provides assistance to small systems through education work- shops and seminars, reports and guidelines, and tutorials on CD. In 2005 EPA published the Water Security Action Plan, which outlines research needs to help water...

  13. The Benefits of Student Research in Information Systems Security Education

    E-Print Network [OSTI]

    for Information Systems Security Studies and Research Code CSIc Naval Postgraduate School Monterey, CA 93943 for the younger students. For example, in fourth grade I painted some cardboard boxes to look like houses

  14. Triggering Control Methods for Cyber-Physical Systems : : Security & Smart Grid Applications

    E-Print Network [OSTI]

    Foroush, Hamed Shisheh

    2014-01-01

    myths and facts behind cyber security risks for industrialMethods for Cyber-Physical Systems: Security & Smart GridMethods for Cyber-Physical Systems: Security & Smart Grid

  15. Security engineering for embedded systems the SecFutur vision

    E-Print Network [OSTI]

    Security engineering for embedded systems the SecFutur vision [Vision Paper] Sigrid Grgens in the development of embedded systems. However, strongly interconnected em- bedded systems play vital roles in many for embedded systems is a discipline that currently attracts more interest. This paper presents the vision

  16. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    DOE Patents [OSTI]

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  17. Laboratory for Education and Research in Secure Systems Engineering (lersse.ece.ubc.ca)

    E-Print Network [OSTI]

    1 Laboratory for Education and Research in Secure Systems Engineering (lersse.ece.ubc.ca) Rodrigo to security incidents: are security tools everything you need? Laboratory for Education and Research in Secure;2 Laboratory for Education and Research in Secure Systems Engineering (lersse.ece.ubc.ca)3 A client sending

  18. A Review of the Security of Insulin Pump Infusion Systems

    SciTech Connect (OSTI)

    Klonoff, David C. [Mills-Peninsula Health Services; Paul, Nathanael R [ORNL; Kohno, Tadayoshi [University of Washington, Seattle

    2011-01-01

    Insulin therapy has enabled diabetic patients to maintain blood glucose control to lead healthier lives. Today, rather than manually injecting insulin using syringes, a patient can use a device, such as an insulin pump, to programmatically deliver insulin. This allows for more granular insulin delivery while attaining blood glucose control. The insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this paper we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components including the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but we also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues both for now and in the future.

  19. DOE Tour of Zero: The System Home by Evolutionary Home Builders...

    Broader source: Energy.gov (indexed) [DOE]

    3,600-square-foot home built by Weiss Building and Development in River Forest, Illinois, is a certified U.S. DOE Zero Energy Ready Home and meets Passive House Institute U.S....

  20. Privacy Act System Notices | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosures

  1. NNSA Policy System | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof Energy MovingAdministration Dec 1,About Us / OurPolicy

  2. Transmission Pricing of Distributed Multilateral Energy Transactions to Ensure System Security and Guide Economic Dispatch

    E-Print Network [OSTI]

    Ilic, Marija; Hsieh, Eric; Remanan, Prasad

    2004-06-16

    Transmission Pricing of Distributed Multilateral Energy Transactions to Ensure System Security and Guide Economic Dispatch...

  3. Power System Probabilistic and Security Analysis on Commodity High Performance Computing Systems

    E-Print Network [OSTI]

    Franchetti, Franz

    Power System Probabilistic and Security Analysis on Commodity High Performance Computing Systems approaches for com- prehensive system analysis. The large-varying grid condi- tion on the aging and stressed power system infrastructures also requires merging of offline security analyses into on- line operation

  4. Investigating alternative concepts of operations for a maritime security system of systems

    E-Print Network [OSTI]

    Mekdeci, Brian Anthony

    For complex systems of systems, such as those required to perform maritime security, system architects have numerous choices they may select from, both in the components and in the way the system operates. Component choices, ...

  5. Collaboration Topics - System Software | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    focuses on research and development of parallel file system interfaces and tools, system resource management capabilities, operating system evaluation, and software...

  6. Scalable Security for Petascale Parallel File Systems

    E-Print Network [OSTI]

    Leung, Andrew W.; Miller, Ethan L; Jones, Stephanie

    2007-01-01

    high performance storage systems. In Proc. 2nd Workshop onobject disks. In Proc. Mass Storage Systems and TechnologiesProc. Conf. on Mass Storage Systems and Technologies, 2005.

  7. DOE Tour of Zero: The System Home by Evolutionary Home Builders LLC

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice of Headquarters1,784-square-footEnergyHome

  8. Control Systems Security Standards: Accomplishments & Impacts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit the followingConcentrating DepartmentOIRVI4136Contracts7019 Unlimited Release

  9. Integrated Security System | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRDEnergy Copyrights ASite InspectionDepartment of333IntegratedA

  10. Aerial Measuring System | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport for the t-) S/,,5 'a C O09OurManagementAerial Measuring

  11. Collaboration Topics - System Software | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia National 1 PAGE 1 OF2Guidance to the1 1 9B.|.©Meshing

  12. Control Systems Security Standards: Accomplishments & Impacts

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p aDepartmentEnergy comparingDeep

  13. emergency management systems | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLos AlamosSimulationdetonationdustin13 Issue 25FinalDraftThesystems |

  14. Control Systems Security Standards: Accomplishments And Impacts |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-in electric vehicle (PEV)Day-June2012 | Department ofEnergyBPDDepartment

  15. DOE Zero Energy Ready Home Case Study: 2013 Weiss Building & Development, LLC., System Home, River Forest, IL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based| Department8, 2015 GATEWAY Takes 9.New Town BuildersHealthyNearLLC System

  16. Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices

    E-Print Network [OSTI]

    Hoen, Ben

    2014-01-01

    of photovoltaic (PV) energy systems on home sale prices.Photovoltaic Energy Systems in California: The Effect on Home Sales Prices

  17. Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices

    E-Print Network [OSTI]

    Hoen, Ben

    2013-01-01

    of photovoltaic (PV) energy systems on home sale prices.Photovoltaic Energy Systems in California: The Effect on Home Sales Prices

  18. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  19. Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction

    E-Print Network [OSTI]

    Peisert, Sean; Margulies, Jonathan

    2014-01-01

    of course Stuxnetthe state of energy security might not bein the fi eld of energy security today is the application ofENERGY CONTROL SYSTEMS SECURITY GUEST EDITORS INTRODUCTION

  20. PIA - Security Clearance Tracking System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyAprilEnergy EEREPlateau Training SystemDepartment ofTracking

  1. PIA - Security Clearance Work Tracking and Budget System | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyAprilEnergy EEREPlateau Training SystemDepartment

  2. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Attacks Against Water SCADA Systems . . . . . . . . . .2 d (bottom) [simulated results]. . Gignac SCADA supervisoryGignac canal network and SCADA system . . . . . . . . .

  3. Using Multiple Unmanned Systems for a Site Security Task

    SciTech Connect (OSTI)

    Matthew O. Anderson; Curtis W. Nielsen; Mark D. McKay; Derek C. Wadsworth; Ryan C. Hruska; John A. Koudelka

    2009-04-01

    Unmanned systems are often used to augment the ability of humans to perform challenging tasks. While the value of individual unmanned vehicles have been proven for a variety of tasks, it is less understood how multiple unmanned systems should be used together to accomplish larger missions such as site security. The purpose of this paper is to discuss efforts by researchers at the Idaho National Laboratory (INL) to explore the utility and practicality of operating multiple unmanned systems for a site security mission. This paper reviews the technology developed for a multi-agent mission and summarizes the lessons-learned from a technology demonstration.

  4. Pressurized security barrier and alarm system

    DOE Patents [OSTI]

    Carver, Don W. (Knoxville, TN)

    1995-01-01

    A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder's making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed.

  5. Pressurized security barrier and alarm system

    DOE Patents [OSTI]

    Carver, D.W.

    1995-04-11

    A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed. 7 figures.

  6. Marine asset security and tracking (MAST) system

    DOE Patents [OSTI]

    Hanson, Gregory Richard (Clinton, TN); Smith, Stephen Fulton (Loudon, TN); Moore, Michael Roy (Corryton, TN); Dobson, Eric Lesley (Charleston, SC); Blair, Jeffrey Scott (Charleston, SC); Duncan, Christopher Allen (Marietta, GA); Lenarduzzi, Roberto (Knoxville, TN)

    2008-07-01

    Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.

  7. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  8. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  9. Improving Security in the ATLAS PanDA System

    E-Print Network [OSTI]

    Caballero, J; The ATLAS collaboration; Nilsson, P; Stewart, G; Potekhin, M; Wenaus, T

    2011-01-01

    The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common `grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is fro...

  10. Secure Communication using Compound Signal from Generalized Synchronizable Chaotic Systems

    E-Print Network [OSTI]

    K. Murali; M. Lakshmanan

    1997-09-20

    By considering generalized synchronizable chaotic systems, the drive-auxiliary system variables are combined suitably using encryption key functions to obtain a compound chaotic signal. An appropriate feedback loop is constructed in the response-auxiliary system to achieve synchronization among the variables of the drive-auxiliary and response-auxiliary systems. We apply this approach to transmit analog and digital information signals in which the quality of the recovered signal is higher and the encoding is more secure.

  11. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  12. Quality Management Systems for Zero Energy Ready Home Webinar (Text

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo. 195 - Oct. 7, 2011 |1 DOEAssurance for Critical

  13. Combi Systems for Low Load homes | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based Fuels|Programs |Chart ofClark2012 National Electric TransmissionCombi

  14. HPXML: A Standardized Home Performance Data Sharing System - Building

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12,ExecutiveFinancing Programs |ReferencePower Supplies | Department ofAmerica

  15. High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems;

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12,ExecutiveFinancing ProgramsDepartmentHigh-EfficiencyPatrick Hughes

  16. Installing and Maintaining a Home Solar Electric System | Department of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelBConservationEnergy5975-01 REPORT ON INSPECTIONEnergy Installing

  17. PIA - Northeast Home Heating Oil Reserve System (Heating Oil) | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyAprilEnergy EERE Infrastructure-EEREHiringSystemof Energy

  18. Modeling Computational Security in Long-Lived Systems, Version 2 Ran Canetti1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Modeling Computational Security in Long-Lived Systems, Version 2 Ran Canetti1,2 , Ling Cheung2 Introduction Computational security in long-lived systems: Security properties of cryptographic protocols computational power. This type of security degrades progressively over the lifetime of a protocol. However, some

  19. Modeling Computational Security in Long-Lived Systems Ran Canetti1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Modeling Computational Security in Long-Lived Systems Ran Canetti1,2 , Ling Cheung2 , Dilsun Kaynar Introduction Computational security in long-lived systems: Security properties of cryptographic protocols protocols, security relies on the assumption that adversarial entities have lim- ited computational power

  20. A Secure Cloud Backup System with Assured Deletion and Version Control

    E-Print Network [OSTI]

    Lui, John C.S.

    A Secure Cloud Backup System with Assured Deletion and Version Control Arthur Rahumed, Henry C. H at a low cost. However, cloud clients must enforce security guarantees of their outsourced data backups. We present FadeVersion, a secure cloud backup system that serves as a security layer on top of today's cloud

  1. Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security Reliability Criteria

    E-Print Network [OSTI]

    Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security reliability criterion, probabilistic reliability criterion and security criterion based on N- contingency control system as well as reasonable strength of grid originally. Because investment for power system

  2. Critical issues in process control system security : DHS spares project.

    SciTech Connect (OSTI)

    Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

    2010-10-01

    The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

  3. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    buildings and smart structures portend immense datavehicles and buildings equipped with smart meters). Thebuildings occupants). The operating systems of upcoming infrastructures such as smart

  4. CyberPhysical System Security for the Electric Power Grid

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    INVITED P A P E R CyberPhysical System Security for the Electric Power Grid Control in power for the power grid as the functional composition of the following: 1) the physical Manuscript received June 29 | The development of a trustworthy smart grid requires a deeper understanding of potential impacts resulting from

  5. Data Integrity Limitations in Highly Secure Systems Cynthia E. Irvine

    E-Print Network [OSTI]

    Irvine, Cynthia E.

    or destruction." [14] A person who has integrity is identified as being one who acts based on a setData Integrity Limitations in Highly Secure Systems Cynthia E. Irvine Department of Computer that is higher in integrity than the integrity level of the COTS components. 1 Introduction Data integrity

  6. MODELING SECURITY IN CYBER-PHYSICAL SYSTEMS

    E-Print Network [OSTI]

    Burmester, Mike

    network at the Davis-Besse nuclear power plant in Oak Harbor, Ohio, was infected [39]. There have been) sys- tems that monitor power, gas/oil transportation, water and waste-water distribution. Such systems

  7. A Secure Modular Mobile Agent System

    E-Print Network [OSTI]

    Julien, Christine

    and Christine Julien The Center for Excellence in Distributed Global Environments The Department of Electrical the system will not be malicious and that any agents which are mali- cious can be identified and contained

  8. Installing and Maintaining a Home Solar Electric System | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool Fits the BillDepartment of Energy SEMIANNUAL REPORT TO CONGRESSEnergy

  9. Planning a Home Solar Electric System | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuilding energy codesPhiladelhia GasDepartment ofN O R T H AofPlanning

  10. Meeting Minutes from Automated Home Energy Management System Expert Meeting

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPAEnergy May 28 Webinar to Focus on7/15DecemberSeptember

  11. Webinar: ENERGY STAR Hot Water Systems for High Performance Homes |

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'S FUTURE. regulators consumerWaste1ofFebruary

  12. Planning for Home Renewable Energy Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyAprilEnergyPartnership forHydrogen Storage »of5)Electricity

  13. Security analysis of communication system based on the synchronization of different order chaotic systems

    E-Print Network [OSTI]

    G. Alvarez; L. Hernandez; J. Munoz; F. Montoya; Shujun Li

    2005-06-27

    This work analyzes the security weakness of a recently proposed communication method based on chaotic modulation and masking using synchronization of two chaotic systems with different orders. It is shown that its application to secure communication is unsafe, because it can be broken in two different ways, by high-pass filtering and by reduced order system synchronization, without knowing neither the system parameter values nor the system key.

  14. Security problems with a SC-CNN-based Chaotic Masking Secure Communication System

    E-Print Network [OSTI]

    A. B. Orue; G. Alvarez; F. Montoya; C. Sanchez-Avila

    2007-06-20

    This paper studies the security of a chaotic cryptosystem based on the Chua circuit and implemented with State Controlled Cellular Neural Networks. It is shown that the plaintext can be retrieved by ciphertext band-pass filtering after an imperfect decoding with wrong receiver parameters. It is also shown that the key space of the system can be notably reduced easing a brute force attack. The system parameters were determined with high precision through the analysis of the decoding error produced by the mismatch between receiver and transmitter parameters.

  15. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  16. Using Home Energy Scoring Systems | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-Sessions | Department ofVP ofof EnergyFactConditions ofUsing Home Energy

  17. Planning for Home Renewable Energy Systems | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/OPerformancePi Day Pi Day Pi Day is

  18. A Virtual Environment for Interactive Visualization of Power System Economic and Security Information

    E-Print Network [OSTI]

    visualization of power system economic and security information. Keywords: Power System Economics, SecurityA Virtual Environment for Interactive Visualization of Power System Economic and Security Information Thomas J. Overbye Raymond P. Klump Jamie D. Weber Senior Member Member Student Member University

  19. 1 8th of january 2014 CNRS Information System Security Charter

    E-Print Network [OSTI]

    Jeanjean, Louis

    1 8th of january 2014 CNRS Information System Security Charter This charter, annexed or availability. Any breach of rules governing information systems security is indeed likely to have significant or the scientific and technical potential). The User makes a contribution to information system security. As such

  20. CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL

    SciTech Connect (OSTI)

    Kathleen A. Lee

    2008-01-01

    The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

  1. Planning a Home Solar Electric System | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access| DepartmentPeerFederal FleetUp inrdPilotWritingEXTERNALl

  2. High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems;

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nA Guide to TappingWORK BREAKDOWNEnergyEnergy details the methods

  3. Installing and Maintaining a Home Solar Electric System | Department of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLANIs gravity a particle or aHowInsideEnergy

  4. An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California

    E-Print Network [OSTI]

    Hoen, Ben

    2011-01-01

    Residential Photovoltaic Energy Systems on Home Sales Prices in CaliforniaResidential Photovoltaic Energy Systems on Home Sales Prices in CaliforniaCalifornia electric utilities provide service under tiered residential rates that charge progressively higher prices for energy

  5. Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; leo, R.; Perman, K.

    2013-08-26

    This is the final report of Phase 2 of the Secure Power Systems Professional project, a 3 phase project. DOE will post to their website upon release.

  6. LEED for Homes Rating System affordablemarket rate multi-family

    E-Print Network [OSTI]

    Zaferatos, Nicholas C.

    -drywall inspection required EA 8 ENERGY STAR Advanced Lighting Package (ALP) EA 9 ENERGY STAR labeled appliances EA10 38 points possible Special Features EA 1 Baseline of ENERGY STAR labeled home EA 2 Pre

  7. Control Systems Cyber Security: Defense-in-Depth Strategies

    SciTech Connect (OSTI)

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing defense-in-depth strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  8. Control Systems Cyber Security:Defense in Depth Strategies

    SciTech Connect (OSTI)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing defense-in-depth strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  9. Prediction Models for a Smart Home based Health Care System Vikramaditya R. Jakkula1

    E-Print Network [OSTI]

    Cook, Diane J.

    Prediction Models for a Smart Home based Health Care System Vikramaditya R. Jakkula1 , Diane J health care. Smart health care systems at home can be used to provide such solutions. A technology a prediction model in an intelligent smart home system can be used for identifying health trends over time

  10. Multiagent Network Security System using FIPA-OS Taraka D. Peddireddy; University of South Carolina; Columbia; South Carolina

    E-Print Network [OSTI]

    Vidal, Jose M.

    Carolina; Columbia; South Carolina Jose M. Vidal, Assistant Professor, University of South Carolina, Columbia, South Carolina Keywords: Multiagent Network Security, Distributed Systems Security, Distributed1 Multiagent Network Security System using FIPA-OS Taraka D. Peddireddy; University of South

  11. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version links between devices in legacy Supervisory Con- trol And Data Acquisition (SCADA) systems, on which security, and yet incurs minimal end-to-end communication latency. Keywords: SCADA network security, bump

  12. Designed-in Security for Cyber-Physical Systems

    E-Print Network [OSTI]

    Peisert, Sean; Margulies, Jonathan; Nicol, David M; Khurana, Himanshu; Sawall, Chris

    2014-01-01

    ROUNDTABLE Designed-in Security for Cyber-Physical Systemsin security: one from academia, one from a cyber-physicalcyber inci- dent while sustaining critical func- tions. Without designed-in security

  13. Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 6th, 2005 Information Systems Security: a Model for HIPAA Security Compliance

    E-Print Network [OSTI]

    Tappert, Charles

    Systems Security: a Model for HIPAA Security Compliance Kathleen M. Bravo Abstract The healthcare industry are struggling with preparedness. HIPAA security differs from current security measures that organizations have in place in that organizations cannot pick and choose which measures to implement but, instead, must adhere

  14. Time Scaling of Chaotic Systems: Application to Secure Communications

    E-Print Network [OSTI]

    Donatello Materassi; Michele Basso

    2007-10-25

    The paper deals with time-scaling transformations of dynamical systems. Such scaling functions operate a change of coordinates on the time axis of the system trajectories preserving its phase portrait. Exploiting this property, a chaos encryption technique to transmit a binary signal through an analog channel is proposed. The scheme is based on a suitable time-scaling function which plays the role of a private key. The encoded transmitted signal is proved to resist known decryption attacks offering a secure and reliable communication.

  15. IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 29, NO. 5, SEPTEMBER 2014 2489 System of Systems Based Security-Constrained Unit

    E-Print Network [OSTI]

    Fu, Yong

    Security-Constrained Unit Commitment Incorporating Active Distribution Grids Amin Kargarian, Student Member--Active distribution grid, decentralized optimiza- tion, security-constrained unit commitment, system of systems of generating units. Number of studied period. Generation cost curve of unit . Commitment state of unit at time

  16. Topic 7 : Smart Grid Privacy and Security 1Networking and Distributed Systems

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    Topic 7 : Smart Grid Privacy and Security 1Networking and Distributed Systems Department Tech UniversityCommunications and Control in Smart Grid 2 Smart Meter Privacy Concerns Possible Solutions Smart Grid Security Load Altering Attacks False Data Injection Attacks Impact

  17. Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems

    E-Print Network [OSTI]

    Stankovic, John A.

    Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems Chanjung Park constraints and security requirements, a new method, called the freezing method, is proposed. In order to show

  18. Design principles and patterns for computer systems that are simultaneously secure and usable

    E-Print Network [OSTI]

    Garfinkel, Simson

    2005-01-01

    It is widely believed that security and usability are two antagonistic goals in system design. This thesis argues that there are many instances in which security and usability can be synergistically improved by revising ...

  19. Securing against fraud in mobile communications : system design and development in 3G mobile networks

    E-Print Network [OSTI]

    Mochizuki, Yujiro, 1973-

    2006-01-01

    Network security ensures the consistency, integrity, and reliability of telecommunications systems. Authorized network access prevents fraudulent communications and maintains the availability of the systems. However, limited ...

  20. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Assessment Methods for SCADA Security Introduction SCADA Security for Managers and Operators Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks...

  1. On The Design and Implementation of a Home Energy Management System

    E-Print Network [OSTI]

    Boutaba, Raouf

    On The Design and Implementation of a Home Energy Management System Jian Li, Jae Yoon Chung, Jin energy management at home is key and an integral part of the future Smart Grid. In this paper, we present the design and implementation of Green Home Service (GHS) for home energy management. Our approach addresses

  2. HomeCooling101

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11,SecurityHome solar systems can save you energy andSaver

  3. Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices

    SciTech Connect (OSTI)

    Hoen, Ben; Wiser, Ryan; Thayer, Mark; Cappers, Peter

    2012-04-15

    Relatively little research exists estimating the marginal impacts of photovoltaic (PV) energy systems on home sale prices. Using a large dataset of California homes that sold from 2000 through mid-2009, we find strong evidence, despite a variety of robustness checks, that existing homes with PV systems sold for a premium over comparable homes without PV systems, implying a near full return on investment. Premiums for new homes are found to be considerably lower than those for existing homes, implying, potentially, a tradeoff between price and sales velocity. The results have significant implications for homeowners, builders, appraisers, lenders, and policymakers.

  4. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    SciTech Connect (OSTI)

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was selected from the list of standards identified in the identification effort. The requirements in these seven standards were then compared against the requirements given in the Framework. This comparison identified gaps (requirements not covered) in both the individual industry standards and in the Framework. In addition to the sector-specific standards reviewed, the team compared the requirements in the cross-sector Instrumentation, Systems, and Automation Society (ISA) Technical Reports (TR) 99 -1 and -2 to the Framework requirements. The Framework defines a set of security classes separated into families as functional requirements for control system security. Each standard reviewed was compared to this template of requirements to determine if the standard requirements closely or partially matched these Framework requirements. An analysis of each class of requirements pertaining to each standard reviewed can be found in the comparison results section of this report. Refer to Appendix A, ''Synopsis of Comparison Results'', for a complete graphical representation of the study's findings at a glance. Some of the requirements listed in the Framework are covered by many of the standards, while other requirements are addressed by only a few of the standards. In some cases, the scope of the requirements listed in the standard for a particular industry greatly exceeds the requirements given in the Framework. These additional families of requirements, identified by the various standards bodies, could potentially be added to the Framework. These findings are, in part, due to the maturity both of the security standards themselves and of the different industries current focus on security. In addition, there are differences in how communication and control is used in different industries and the consequences of disruptions via security breaches to each particular industry that could affect how security requirements are prioritized. The differences in the requirements listed in the Framework and in the various industry standards are due, in part, to differences in the level and purpose of the standards. While the requir

  5. security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2Anational lab | National0/%2A

  6. BETTER DUCT SYSTEMS FOR HOME HEATING AND COOLING.

    SciTech Connect (OSTI)

    ANDREWS,J.

    2001-01-01

    This is a series of six guides intended to provide a working knowledge of residential heating and cooling duct systems, an understanding of the major issues concerning efficiency, comfort, health, and safety, and practical tips on installation and repair of duct systems. These guides are intended for use by contractors, system designers, advanced technicians, and other HVAC professionals. The first two guides are also intended to be accessible to the general reader.

  7. Energy Sector Security Appliances in a System for Intelligent Learning Network Configuration Management and Monitoring (Essence)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015 Infographic courtesyEducationNevada | DepartmenttoPublicSector Security

  8. Building America Case Study: Selecting Ventilation Systems for Existing Homes (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-12-01

    This document addresses adding -or improving - mechanical ventilation systems to existing homes. The purpose of ventilation is to remove contaminants from homes, and this report discusses where, when, and how much ventilation is appropriate in a home, including some discussion of relevant codes and standards. Advantages, disadvantages, and approximate costs of various system types are presented along with general guidelines for implementing the systems in homes. CARB intends for this document to be useful to decision makers and contractors implementing ventilation systems in homes. Choosing the "best" system is not always straightforward; selecting a system involves balancing performance, efficiency, cost, required maintenance, and several other factors. It is the intent of this document to assist contractors in making more informed decisions when selecting systems. Ventilation is an integral part of a high-performance home. With more air-sealed envelopes, a mechanical means of removing contaminants is critical for indoor environmental quality and building durability.

  9. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1: it is bad code. This perspective on computer security education informs the design of our new approach, computer security education is often relegated to a secondary role in undergraduate curricula. Exposure

  10. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Ray, Indrakshi

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how}@cs.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  11. REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH

    E-Print Network [OSTI]

    REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE and expanded its catalog of security controls to help organizations protect their information and information, the revised catalog brings together, for the first time, comprehensive information about security controls

  12. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  13. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations

    E-Print Network [OSTI]

    Wang, Jia

    1 Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations Cong Wang and cloud are not necessarily in the same trusted domain brings many security concerns and chal- lenges the quality of the computed results. Thus, we argue that the cloud is intrinsically not secure from

  14. Securing Wireless Systems via Lower Layer Enforcements Zang Li, Wenyuan Xu, Rob Miller, Wade Trappe

    E-Print Network [OSTI]

    Xu, Wenyuan

    Securing Wireless Systems via Lower Layer Enforcements Zang Li, Wenyuan Xu, Rob Miller, Wade Trappe Wireless Information Network Laboratory (WINLAB) Rutgers, The State University of New Jersey 73 Brett Rd security mechanisms are essential to the overall problem of securing wireless net- works, these techniques

  15. Quality Management Systems for Zero Energy Ready Home Webinar...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    quality management system? And again, I'm not going to spend all the time here. It takes multi-day training from ISO 9001 to go into all of it. But there are some of the key parts...

  16. Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100

    E-Print Network [OSTI]

    Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100 Software Version: 6.5.2.8 FIPS@corsec.com http://www.bluecoat.com http://www.corsec.com #12;Secure Web Gateway Virtual Appliance-V100 Security Policy, Version 0.5 July 25, 2014 Blue Coat Secure Web Gateway Virtual Appliance-V100 Page 2 of 33 2014

  17. Building America System Research Plan for Reduction of Miscellaneous Electrical Loads in Zero Energy Homes

    SciTech Connect (OSTI)

    Barley, C. D.; Haley, C.; Anderson, R.; Pratsch, L.

    2008-11-01

    This research plan describes the overall scope of system research that is needed to reduce miscellaneous electrical loads (MEL) in future net zero energy homes.

  18. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect (OSTI)

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  19. Toward a Security Domain Model for Static Analysis and Verification of Information Systems

    E-Print Network [OSTI]

    Toward a Security Domain Model for Static Analysis and Verification of Information Systems Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Tim Levin Computer Science Department Naval Postgraduate School

  20. Technology Solutions Case Study: Selecting Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    2014-12-01

    In multifamily buildings, particularly in the Northeast, exhaust ventilation strategies are the norm as a means of meeting both local exhaust and whole-unit mechanical ventilation rates. The issue of where the "fresh" air is coming from is gaining significance as air-tightness standards for enclosures become more stringent, and the normal leakage paths through the building envelope disappear. Researchers from the Consortium for Advanced Residential Buildings (CARB) found that the majority of high performance, new construction, multifamily housing in the Northeast use one of four general strategies for ventilation: continuous exhaust only with no designated supply or make-up air source, continuous exhaust with ducted make-up air to apartments, continuous exhaust with supply through a make-up air device integral to the unit HVAC, and continuous exhaust with supply through a passive inlet device, such as a trickle vent. Insufficient information is available to designers on how these various systems are best applied. In this project, the CARB team evaluated the four different strategies for providing make-up air to multifamily residential buildings and developed guidelines to help contractors and building owners choose the best ventilation systems.

  1. A Secure Framework for Monitoring Operating Systems Using SPEs in Cell/B.E. Kenichi Kourai

    E-Print Network [OSTI]

    Kourai, Kenichi

    A Secure Framework for Monitoring Operating Systems Using SPEs in Cell/B.E. Kenichi Kourai Kyushu@ksl.ci.kyutech.ac.jp Abstract--Recently, even operating systems are often com- promised by the attackers. Since a compromised operating system affects all the applications including security software on top of it, the integrity

  2. Verification of Initial-State Opacity in Security Applications of Discrete Event Systems6

    E-Print Network [OSTI]

    Hadjicostis, Christoforos

    Verification of Initial-State Opacity in Security Applications of Discrete Event Systems6 that are modeled as non-deterministic finite automata with partial observation on their transitions. A system and power distribution systems), var- ious notions of security and privacy have received considerable

  3. A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems

    E-Print Network [OSTI]

    Kubiatowicz, John D.

    A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems Hsiao-Ying Lin, John@cs.nctu.edu.tw Abstract--Networked storage systems provide storage services for users over networks. Secure networked storage systems store encrypted data to guarantee data confi- dentiality. However, using encryption

  4. DepSys: Dependency Aware Integration of Cyber-Physical Systems for Smart Homes

    E-Print Network [OSTI]

    Stankovic, John A.

    and water and enable the running of many CPS applications. Like other Cyber-Physical Systems (CPSs), when 978-1-4503-1170-0 ...$5.00. network will act as a utility similar to electricity and wa- ter. Then, different CPS applications in domains such as health, security, entertainment, and energy can be installed

  5. Modeling Computational Security in LongLived Systems # ## Ran Canetti 1,2 , Ling Cheung 2 , Dilsun Kaynar 3 ,

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Modeling Computational Security in LongLived Systems # ## Ran Canetti 1,2 , Ling Cheung 2 , Dilsun Introduction Computational security in longlived systems: Security properties of cryptographic protocols computational power. This type of security degrades progressively over the lifetime of a protocol. However, some

  6. Measurement-Based Evaluation of Installed Filtration System Performance in Single-Family Homes

    SciTech Connect (OSTI)

    Chan, Wanyu Rengie; Singer, Brett C.

    2014-04-03

    This guide discusses important study design issues to consider when conducting an on-site evaluation of filtration system performance. The two most important dichotomies to consider in developing a study protocol are (1) whether systems are being evaluated in occupied or unoccupied homes and (2) whether different systems are being compared in the same homes or if the comparison is between systems installed in different homes. This document provides perspective and recommendations about a suite of implementation issues including the choice of particle measurement devices, selection of sampling locations, ways to control and/or monitor factors and processes that can impact particle concentrations, and data analysis approaches.

  7. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  8. Breaking a secure communication scheme based on the phase synchronization of chaotic systems

    E-Print Network [OSTI]

    G. Alvarez; F. Montoya; G. Pastor; M. Romera

    2003-11-20

    A security analysis of a recently proposed secure communication scheme based on the phase synchronization of chaotic systems is presented. It is shown that the system parameters directly determine the ciphertext waveform, hence it can be readily broken by parameter estimation of the ciphertext signal.

  9. A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp

    E-Print Network [OSTI]

    George, Edward I.

    Page 1 I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103 and Responsibility Information Systems and Computing is responsible for the operation of Penn's data networks (Penn-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer

  10. March 23, 1999 Copyright 1999 Baptist Health Systems of SF 1 Security Requirements in

    E-Print Network [OSTI]

    March 23, 1999 Copyright 1999 Baptist Health Systems of SF 1 Security Requirements in Healthcare;March 23, 1999 Copyright 1999 Baptist Health Systems of SF 2 Introduction OMG -- forum for software are standardized This presentation objective What US healthcare wants from security vendors #12;March 23, 1999

  11. THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE

    E-Print Network [OSTI]

    Pillow, Jonathan

    the work. 1.2 PURPOSE A. Establish design criteria, define activities, identify stakeholders and assignTHE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING Installation & Repair shop. 1.3 OVERVIEW A. The electronic safety and security systems for UT Austin

  12. List of Major Information Systems,National Nuclear Security Administra...

    Broader source: Energy.gov (indexed) [DOE]

    emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network...

  13. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies More Documents & Publications Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Mitigations for...

  14. Language and Framework Support for Reviewably-Secure Software Systems

    E-Print Network [OSTI]

    Mettler, Adrian Matthew

    2012-01-01

    1.1.2 Programming Languages and Abstractions . . . . . . . .security properties. Languages and programming idioms thatJ. Popek. Report on the programming language Euclid. SIGPLAN

  15. Control Systems Security News Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Surge and Sea-Level Rise State and Regional Energy Risk Assessment Initiative National Electricity Delivery Division Infrastructure Security and Energy Restoration About Us...

  16. An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California

    SciTech Connect (OSTI)

    Hoen, Ben; Cappers, Peter; Wiser, Ryan; Thayer, Mark

    2011-04-19

    An increasing number of homes in the U.S. have sold with photovoltaic (PV) energy systems installed at the time of sale, yet relatively little research exists that estimates the marginal impacts of those PV systems on home sale prices. A clearer understanding of these possible impacts might influence the decisions of homeowners considering the installation of a PV system, homebuyers considering the purchase of a home with PV already installed, and new home builders considering including PV as an optional or standard product on their homes. This research analyzes a large dataset of California homes that sold from 2000 through mid-2009 with PV installed. It finds strong evidence that homes with PV systems sold for a premium over comparable homes without PV systems during this time frame. Estimates for this premium expressed in dollars per watt of installed PV range, on average, from roughly $4 to $5.5/watt across a large number of hedonic and repeat sales model specifications and robustness tests. When expressed as a ratio of the sales price premium of PV to estimated annual energy cost savings associated with PV, an average ratio of 14:1 to 19:1 can be calculated; these results are consistent with those of the more-extensive existing literature on the impact of energy efficiency on sales prices. When the data are split among new and existing homes, however, PV system premiums are markedly affected. New homes with PV show premiums of $2.3-2.6/watt, while existing homes with PV show premiums of more than $6/watt. Reasons for this discrepancy are suggested, yet further research is warranted. A number of other areas where future research would be useful are also highlighted.

  17. Information System Security Critical Elements Please note that prior to including this language in the performance plans of employees covered by

    E-Print Network [OSTI]

    Information System Security Critical Elements Please note that prior to including this language fulfilled. Stand-Alone Critical Elements Senior Agency Information Security Officer/Chief Information Security Officer/ Information Technology Security Officer Critical Element and Objective Senior Agency

  18. Home Energy Article: A Systems Approach to Retrofitting Residential HVAC Systems

    E-Print Network [OSTI]

    McWilliams, Jennifer A.; Walker, Iain S.

    2005-01-01

    s (LBNL) Home Energy Saver (http://homeenergysaver.lbl.gov),to DOEs Home Energy Saver ( www.homenergysaver.lbl.gov )

  19. Department of Defense National Security Personnel System : the transition to pay for performance

    E-Print Network [OSTI]

    Davies, Rebecca L. (Rebecca Leigh), 1960-

    2004-01-01

    The 2004 National Defense Authorization Act (Public Law 10-136, November 24, 2003) gives the Department of Defense (DoD) authority to establish the National Security Personnel System (NSPS). This system will mark the most ...

  20. Building America Best Practices Series, Volume 6: High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems

    SciTech Connect (OSTI)

    Baechler, Michael C.; Gilbride, Theresa L.; Ruiz, Kathleen A.; Steward, Heidi E.; Love, Pat M.

    2007-06-04

    This guide is was written by PNNL for the US Department of Energy's Building America program to provide information for residential production builders interested in building near zero energy homes. The guide provides indepth descriptions of various roof-top photovoltaic power generating systems for homes. The guide also provides extensive information on various designs of solar thermal water heating systems for homes. The guide also provides construction company owners and managers with an understanding of how solar technologies can be added to their homes in a way that is cost effective, practical, and marketable. Twelve case studies provide examples of production builders across the United States who are building energy-efficient homes with photovoltaic or solar water heating systems.

  1. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  2. A secure communication protocol based on public-key cryptography for distributed systems

    E-Print Network [OSTI]

    Deo, Sanjay

    1992-01-01

    of the process can be significantly improved if both systems adhere to a common standard. Computer security standards are needed to reduce the cost of security products and to allow for interoperability and evaluation. Standards allow for compatibility among... vendor's products, thereby increasing competition, which eventually lowers the cost of these products. Unless security is inexpensive and convenient, it will only be used as an exception, leaving many important applications unprotected. Until recently...

  3. Networking technology adoption : system dynamics modeling of fiber-to-the-home

    E-Print Network [OSTI]

    Kelic, Andjelka, 1972-

    2005-01-01

    A system dynamics model is developed and run to study the adoption of fiber-to-the-home as a residential broadband technology. Communities that currently do not have broadband in the United States are modeled. This case ...

  4. Potential uses of a wireless network in physical security systems.

    SciTech Connect (OSTI)

    Witzke, Edward L.

    2010-07-01

    Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.

  5. A System for Smart Home Control of Appliances based on Timer and Speech Interaction

    E-Print Network [OSTI]

    Haque, S M Anamul; Islam, Md Ashraful

    2010-01-01

    The main objective of this work is to design and construct a microcomputer based system: to control electric appliances such as light, fan, heater, washing machine, motor, TV, etc. The paper discusses two major approaches to control home appliances. The first involves controlling home appliances using timer option. The second approach is to control home appliances using voice command. Moreover, it is also possible to control appliances using Graphical User Interface. The parallel port is used to transfer data from computer to the particular device to be controlled. An interface box is designed to connect the high power loads to the parallel port. This system will play an important role for the elderly and physically disable people to control their home appliances in intuitive and flexible way. We have developed a system, which is able to control eight electric appliances properly in these three modes.

  6. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  7. Measured heating system efficiency retrofits in eight manufactured (HUD-code) homes

    SciTech Connect (OSTI)

    Siegel, J.; Davis, B.; Francisco, P.; Palmiter, L.

    1998-07-01

    This report presents the results of field measurements of heating efficiency performed on eight all-electric manufactured homes sited in the Pacific Northwest with forced-air distribution systems. These homes, like more than four million existing manufactured homes in the US, were constructed to thermal specifications that were mandated by the US Department of Housing and Urban Development in 1976. The test protocol compares real-time measurements of furnace energy usage with energy usage during periods when zonal heaters heat the homes to the same internal temperature. By alternating between the furnace and zonal heaters on 2 hour cycles, a short-term coheat test is performed. Additional measurements, including blower door and duct tightness tests, are conducted to measure and characterize the home's tightness and duct leakage so that coheat test results might be linked to other measures of building performance. The testing was done at each home before and after an extensive duct sealing retrofit was performed. The average pre-retrofit system efficiency for these homes was 69%. After the retrofit, the average system efficiency increased to 83%. The average simple payback period for the retrofits ranges from 1 to 5 years in Western Oregon and 1 to 3 years in colder Eastern Oregon.

  8. Electronic DOE Information Security System (eDISS) PIA

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And StatisticsProgramof-SA-02: SupplementDepartment ofElectricity Fuel Basics Electricity

  9. Roadmap to Secure Control Systems in the Energy Sector

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo. 195 - Oct.7,BreakoutRetoolingREVIEWRichardRiskEnergyandRoadmap to

  10. Security Framework for Control System Data Classification and Protection |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProjectDataSecretary Moniz's OpenEnergy SCADASeptember 29,November

  11. Security Metricsfor Process Control Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProjectDataSecretary Moniz's OpenEnergy SCADASeptember

  12. Developing Secure Power Systems Professional Competence: Alignment and Gaps

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based| Department8, 20153DanielthroughDeterminingmanagement toLifeNEET|in

  13. Roadmap to Secure Control Systems in the Energy: Executive Summary

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-A WholesaleRetrofitElectrical Equipment ToForeword T his

  14. Information System Security Manager (ISSM) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelBConservation StandardsEnergyDepartmentOwner (ISO)

  15. Information System Security Officer (ISSO) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelBConservation StandardsEnergyDepartmentOwner (ISO)Officer (ISSO)

  16. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergy Webinar:IAbout Us » Contact PPPOContributing Data

  17. Control Systems Security Publications Library | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergy Webinar:IAbout Us » Contact PPPOContributing DataPublications

  18. ORO Office Safeguards and Security Clearance Tracking System and Visitor

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014Department ofWindOPEN GOVERNMENT OPEN4 Summary

  19. Pantex Occupational Health System (OHS), National Nuclear Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyAprilEnergy EEREPlateauFolsomProgressPaducahPage UnderPalm

  20. 64 Home Power #30 August / September 1992 ny renewable energy system that

    E-Print Network [OSTI]

    Johnson, Eric E.

    64 Home Power #30 August / September 1992 ny renewable energy system that employs an inverter to produce 120-volt alternating current must have a grounding system for safety. The National Electrical Code Side If this type of inverter, with multiple ac receptacles, is connected to a distribution panel

  1. The Local Energy Indicator: Designing for Wind and Solar Energy Systems in the Home

    E-Print Network [OSTI]

    Paulos, Eric

    The Local Energy Indicator: Designing for Wind and Solar Energy Systems in the Home James Pierce energy for interactive systems design. We characterize local energy in terms of three themes: contextuality, seasonality, and visibility/tangibility. Here we focus on two specific local energy technologies

  2. The Gesture Pendant: A Self-illuminating, Wearable, Infrared Computer Vision System for Home Automation Control and Medical Monitoring

    E-Print Network [OSTI]

    Starner, Thad E.

    such as home entertainment equipment and the room light- ing can be controlled with simple movementsThe Gesture Pendant: A Self-illuminating, Wearable, Infrared Computer Vision System for Home of home automation systems via hand gestures. This solu- tion has many advantages over traditional home

  3. DOE and Industry Showcase New Control Systems Security Technologies at

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based| Department8, 2015 GATEWAY Takes 9.NewExtreme HomesEnergyDistribuTECH

  4. An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions

    E-Print Network [OSTI]

    Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

    2006-01-01

    This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the following important dimensions...

  5. Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development ProgramsSummary Report

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; Leo, R.; Perman, K.

    2013-07-01

    This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.

  6. Remote Management and Secure Application Development for Pervasive Home Systems Using JASON

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    as burglar alarms. Surveillance cameras may monitor the doors. Electronic en- ergy meters, gas meters. Houses may be equipped with many mod- ern appliances, ranging from hi-fi sets, tv's, pc's, smart fridges and water meters record and report usage periodically and automatically without human inter- vention

  7. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    Smith, Sean W.

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA) systems

  8. Risk assessment of climate systems for national security.

    SciTech Connect (OSTI)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  9. On The Security of Mobile Cockpit Information Systems Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast,

    E-Print Network [OSTI]

    Snoeren, Alex

    expanded to include live data such as weather and traffic information that is used to make flight decisions, information kiosks, home automation controls, and so on--our expectations of security and reliability information services supported by the receiver, the display may also include a graphical weather overlay (FIS

  10. HOME INSECURITY: NO ALARMS, FALSE ALARMS, AND SIGINT

    SciTech Connect (OSTI)

    Lamb, Logan M [ORNL

    2014-01-01

    The market share of home security systems has substantially increased as vendors incorporate more desirable features: intrusion detection, automation, wireless, and LCD touch panel controls. Wireless connectivity allows vendors to manufacture cheaper, more featureful products that require little to no home modification to install. Consumer win, since adding devices is easier. The result: an ostensibly more secure, convenient, and connected home for a larger number of citizens. Sadly, this hypothesis is flawed; the idea of covering a home with more security sensors does not translate into a more secure home. Additionally, the number of homes using these vulnerable systems is large, and the growth rate is increasing producing a even larger problem. In this talk, I will demonstrate a generalized approach for compromising three systems: ADT, the largest home security dealer in North America; Honeywell, one of the largest manufacturers of security devices; and Vivint, a top 5 security dealer. We will suppress alarms, create false alarms, and collect artifacts that facilitate tracking the movements of individuals in their homes.

  11. Estimated costs of ventilation systems complying with the HUD ventilation standard for manufactured homes

    SciTech Connect (OSTI)

    Miller, J.D.; Conner, C.C.

    1993-11-01

    At the request of the US Department of Housing and Urban Development (HUD), the Pacific Northwest Laboratory estimated the material, labor, and operating costs for ventilation equipment needed for compliance with HUD`s proposed revision to the ventilation standard for manufactured housing. This was intended to bound the financial impacts of the ventilation standard revision. Researchers evaluated five possible prototype ventilation systems that met the proposed ventilation requirements. Of those five, two systems were determined to be the most likely used by housing manufacturers: System 1 combines a fresh air duct with the existing central forced-air system to supply and circulate fresh air to conditioned spaces. System 2 uses a separate exhaust fan to remove air from the manufactured home. The estimated material and labor costs for these two systems range from $200 to $300 per home. Annual operating costs for the two ventilation systems were estimated for 20 US cities. The estimated operating costs for System 1 ranged from $55/year in Las Vegas, Nevada, to $83/year in Bismarck, North Dakota. Operating costs for System 2 ranged from a low of $35/year in Las Vegas to $63/year in Bismarck. Thus, HUD`s proposed increase in ventilation requirements will add less than $100/year to the energy cost of a manufactured home.

  12. Zicom Electronic Security Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavyAgencyTendo NewYanbu, Saudi Arabia:InformationZicom

  13. Mitigations for Security Vulnerabilities Found in Control System Networks |

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPAEnergy6-09.docAERMOD-PRIME, Units 4, 1,Ridge | Department

  14. ETTP Security Access Control System (ESACS) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergy Webinar:IAboutReubenPress Releases EM PressENERGY|About Us »

  15. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  16. INTELLIGENT ILLICIT OBJECT DETECTION SYSTEM FOR ENHANCED AVIATION SECURITY

    E-Print Network [OSTI]

    Blumenstein, Michael

    , Gold Coast Campus, QLD 9726, Australia. Email: {v.muthu, m.blumenstein, j.jo, s.green}@griffith.edu.au ABSTRACT Although aviation security is not a new phenomenon to the world, current threats are much more stopped by an object, the kinetic energy of those electrons is converted to heat and X

  17. CONSIDERATION OF SECURITY IN TELEHEALTH WIRELESS SENSOR NETWORK MONITORING SYSTEMS

    E-Print Network [OSTI]

    in the security of data transmission through wire- less sensor networks (WSN). Each individual node in a WSN. The Flooding Time Synchronization Protocol (FTSP) [5] is proposed to ensure time sychrony in the telehealh WSN to investigate the effects of injecting bad time synchroniza- tion messages into a WSN implemented with the FTSP

  18. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  19. Efficient and Secure Storage Systems Based on Peer-to-Peer Systems Yongge Wang, Yuliang Zheng, and Beitseng Chu

    E-Print Network [OSTI]

    Wang, Yongge

    Efficient and Secure Storage Systems Based on Peer-to-Peer Systems Yongge Wang, Yuliang Zheng Distributed storage service requirements Networked storage systems make distributed storage services simple storage systems are relatively difficult to imple- ment. Only after these problems are solved

  20. Access Rate Control System | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden Documentation DataStreamsTotalproposalsAboutAcceleratingth

  1. LANL installs high-performance computer system | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResource and Job Event In

  2. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  3. NREL Fills Key Leadership Role for Energy Systems Security and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    consisting of a smart home, electricity storage, an electric vehicle charging station and solar panels. Since January 2012, Ibrahim has maintained the Smart Grid Educational...

  4. Project Management and Systems Support | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matricesstudents working1999-2000University 4You

  5. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation ofAlbuquerque Albuquerque Housing Education RecreationLong-termFacebook

  6. Small Business Sourcing System | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation ofAlbuquerque|Sensitive Species3performed Steven D.

  7. DYNAMIC SECURITY ANALYSIS OF ELECTRIC POWER SYSTEMS: PASSIVITY-BASED APPROACH AND POSITIVE INVARIANCE APPROACH

    E-Print Network [OSTI]

    Shen, Jinglai

    DYNAMIC SECURITY ANALYSIS OF ELECTRIC POWER SYSTEMS: PASSIVITY-BASED APPROACH AND POSITIVE power system to supply electricity. By nature, a power system is continually experiencing disturbances through the electric power grid is modeled by a set of nonlinear differential/algebraic equations. These n

  8. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide@cs.dartmouth.edu #12;Contents 1 Introduction 3 1.1 SCADA Systems

  9. CITI Technical Report 01-6 SC-CFS: Smartcard Secured Cryptographic File System

    E-Print Network [OSTI]

    Honeyman, Peter

    CITI Technical Report 01-6 SC-CFS: Smartcard Secured Cryptographic File System Naomaru Itoi Center;le system, are not perfect against these attacks. We have developed SC-CFS, a #12;le system that encrypts #12;les and takes advantage of a smartcard for per-#12;le key generation. SC-CFS counters password

  10. MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

    E-Print Network [OSTI]

    MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY Shirley Radack, Editor U.S. Department of Commerce Organizations have to make frequent changes to their information systems result in adjustments being made to the configuration of information systems; these activities could have

  11. Engineering complex systems for health, security and the environment Giovanni De Micheli

    E-Print Network [OSTI]

    De Micheli, Giovanni

    of care; v) risk mitigation systems based on early warnings of earthquakes, tsunamis, glacierEngineering complex systems for health, security and the environment Giovanni De Micheli EPFL by the smart use of technology. The last forty years have witnessed the realization of computational systems

  12. Fast and Secure Magnetic WORM Storage Systems Yongge Wang and Yuliang Zheng

    E-Print Network [OSTI]

    Wang, Yongge

    Fast and Secure Magnetic WORM Storage Systems Yongge Wang and Yuliang Zheng Department of Software on the existence of trustworthy log files. Current storage systems for such log files are generally prone, as well as the demand for trustworthy storage systems, it is timely to design and develop fast storage

  13. AWARDS: An Adaptive Write Strategy for Secure Local Disk Systems Mais Nijim, Xiao Qin

    E-Print Network [OSTI]

    Qin, Xiao

    importance for modern storage systems, it is imperative to protect stored data from being tampered or disclosed. Although an increas- ing number of secure storage systems have been devel- oped, there is no way.0% and 358.9% (with averages of 199.5% and 213.4%). 1 Introduction In the past decade, storage systems have

  14. Routing, Storage Management and Caching, and Security of Peer-to-Peer Storage Systems

    E-Print Network [OSTI]

    Zhu, Yingwu "Jason"

    Routing, Storage Management and Caching, and Security of Peer-to-Peer Storage Systems Yingwu Zhu such as Napster, Gnutella and Freenet, has inspired a whole new breed of P2P storage systems, which aims-tolerant, and highly-available storage without centralized servers. Many P2P storage systems have been proposed

  15. Hardware Security for Device Authentication in the Smart Grid

    E-Print Network [OSTI]

    Murawski, Andrzej

    Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin. Secure communication between devices is a key aspect of smart grid security. In the future smart home environment, various smart devices, appliances and energy management systems will communicate with each other

  16. WELFARE MEASURES TO REFLECT HOME LOCATION OPTIONS WHEN1 TRANSPORTATION SYSTEMS ARE MODIFIED2

    E-Print Network [OSTI]

    Kockelman, Kara M.

    of residential location choice is fundamental to behavioral5 models of land use, and, ultimately, travel demand (or willingness-to-pay) impacts of system23 changes by bringing residential location choice by home price shifts. Automobile costs play a more important role in32 residential location choices

  17. Biologically inspired artificial haircell sensors Today's engineering systems, such as machines, vehicles, robots, medical devices, home

    E-Print Network [OSTI]

    Valero-Cuevas, Francisco

    of polymer MEMS to enable simple sensor packaging and sensor-electronics integration. Short Bio: Chang LiuTitle: Biologically inspired artificial haircell sensors Abstract: Today's engineering systems, such as machines, vehicles, robots, medical devices, home appliances and entertainment devices, are often sensor

  18. 1538 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 3, AUGUST 2005 Security-Constrained Unit Commitment

    E-Print Network [OSTI]

    Fu, Yong

    1538 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 3, AUGUST 2005 Security-Constrained Unit the security-constrained unit commitment (SCUC) program to plan a secure and economical hourly generation approach applies the Benders decomposition for separating the unit commitment (UC) in the master problem

  19. On Energy Security of Server Systems Zhenyu Wu, Member, IEEE, Mengjun Xie, Member, IEEE, and Haining Wang, Senior Member, IEEE

    E-Print Network [OSTI]

    Wang, Haining

    On Energy Security of Server Systems Zhenyu Wu, Member, IEEE, Mengjun Xie, Member, IEEE and achieve energy proportional computing. However, the security perspective of server power management has and evaluate its effectiveness. Index Terms--Energy attack, server security, energy-aware programming 1

  20. FIPS 1402 NonProprietary Security Policy: Persistent Systems Wave Relay Single, Dual, and Quad Radio Document Version 5.2 Persistent Systems Page 1 of 21

    E-Print Network [OSTI]

    Proprietary Security Policy Persistent Systems Wave Relay Single, Dual, and Quad Radio Board Level 1Proprietary Security Policy: Persistent Systems Wave Relay Single, Dual, and Quad Radio Board Document Version 5 Policy for the Wave Relay Single, Dual, and Quad Radio Board. #12;FIPS 1402 NonProprietary Security

  1. A Fuzzy-Logic Subsumption Controller for Home Energy Management Systems

    SciTech Connect (OSTI)

    Ainstworth, Nathan; Johnson, Brian; Lundstrom, Blake

    2015-10-05

    Presentation for NAPS 2015 associated with conference publication CP-64392. Home Energy Management Systems (HEMS) are controllers that manage and coordinate the generation, storage, and loads in a home. These controllers are increasingly necessary to ensure that increasing penetrations of distributed energy resources are used effectively and do not disrupt the operation of the grid. In this paper, we propose a novel approach to HEMS design based on behavioral control methods, which do not require accurate models or predictions and are very responsive to changing conditions.

  2. Cyber Security Procurement Language for Control Systems Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer...

  3. Linking home energy rating systems with energy efficiency financing: Progress on national and state programs

    SciTech Connect (OSTI)

    Farhar, B.C.; Collins, N.E.; Walsh, R.W.

    1996-10-01

    In 1991 and early 1992, the U.S. Department of Energy (DOE), in cooperation with the U.S. Department of Housing and Urban Development (HUD), established a National Collaborative on Home Energy Rating Systems (HERS) and Energy Efficient Mortgages (EEMs). The Collaborative's purpose was to involve stakeholders at a national policy level to develop a plan leading the nation toward a voluntary system linking HERS with EEMs. The National Renewable Energy Laboratory (NREL) coordinated the National Collaborative's meetings for DOE. Composed of representatives from 25 stakeholder organizations, the Collaborative, after some 14 meetings, reached consensus on two documents, both published by NREL in mg 1992: A National Program for Energy-Efficient Mortgages and Home Energy Rating Systems: A Blueprint for Action and Going National with HERS and EEMs: Issues and Impacts, The Collected Papers of the National Collaborative.

  4. GAO Challenges and Efforts to Secure Control Systems (March 2004) |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11, SolarMat 4" | DepartmentJune 3, 2015 2

  5. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygenLaboratoryInnovationEmployee &and Assessments Programs

  6. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygenLaboratoryInnovationEmployee &and Assessments

  7. Recommended Practice for Securing Control System Modems | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy AEnergyPresidentialThis 3-D renderingPartnership ofRSS May 30,Annual

  8. Rapid Deployment Shelter System | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100 Winners * Impacts on GlobalRachel2 RadiometerRafael L.Ralph(MeVcm²/mg)Rapid

  9. Rapid Deployment Shelter System, Application | Y-12 National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100 Winners * Impacts on GlobalRachel2 RadiometerRafael

  10. Computational Systems & Software Environment | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport for the t-) S/,,5 'a C |Administration Computational

  11. Prototype system brings advantages of wireless technology to secure

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNationalPrograms | National Nuclear

  12. Crops reap benefits of Pantex irrigation system | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia National 1 PAGE 1 OF2Guidance to the1N I T

  13. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|in theLegislativeIComplaints - Golden Field Office PIA

  14. List of Major Information Systems,National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResourcelogo and-E CChinaC L S C O N C E P T U A L D E

  15. Common Cyber Security Vulnerabilities Observed in Control System

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-in electric vehicle (PEV)Day-June 22, 2015OperationNonprofit| Department

  16. Control Systems Cyber Security: Defense in Depth Strategies | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-in electric vehicle (PEV)Day-June2012 | Department ofEnergyBPD

  17. DOE and Industry Showcase New Control Systems Security Technologies at

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-in electricLaboratory | DepartmentDOE Zero Energy ReadyHomeowners Pay

  18. Tools and Methods for Hardening Communication Security of Energy Delivery Systems

    SciTech Connect (OSTI)

    Gadgil, Shrirang; Lin, Yow-Jian; Ghosh, Abhrajit; Samtani, Sunil; Kang, Jaewon; Siegell, Bruce; Kaul, Vikram; Unger, John; De Bruet, Andre; Martinez, Catherine; Vermeulen, Gerald; Rasche, Galen; Sternfeld, Scott; Berthier, Robin; Bobba, Rakesh; Campbell, Roy; Sanders, Williams; Lin, Yow-Jian

    2014-06-30

    This document summarizes the research and development work the TT Government Solutions (TTGS), d.b.a. Applied Communication Sciences (ACS), team performed for the Department of Energy Cybersecurity for Energy Delivery Systems (CEDS) program. It addresses the challenges in protecting critical grid control and data communication, including the identification of vulnerabilities and deficiencies of communication protocols commonly used in energy delivery systems (e.g., ICCP, DNP3, C37.118, C12.22), as well as the development of effective means to detect and prevent the exploitation of such vulnerabilities and deficiencies. The team consists of TT Government Solutions (TTGS), a leading provider of communications solutions that has extensive experience in commercializing communications solutions. TTGS also has deep cyber security research and development expertise supporting a variety of customers. University of Illinois at Urbana-Champaign (UIUC), a leader in the cyber security research for the power grid. UIUC brings unique experience in designing secure communication protocols to this project. Electric Power Research Institute (EPRI), an independent nonprofit that conducts research and development relating to the generation, delivery and use of electricity for the benefit of the public. EPRI brings to this effort its extensive technical expertise and its utility connections, with members representing more than 90 percent of the electricity generated and delivered in the United States. DTE Energy, the 10th largest electric utility in the US, which helps ensure that this project focuses on the needs of utilities and is rightly positioned to address the needs of the market place. We designed, developed, and demonstrated a modular and extensible ADEC-G (Agent-based, Distributed, Extensible Cybersecurity for the Grid) system for monitoring/detecting abnormal energy delivery systems (EDS) protocol usage and ensuring security coverage. Our approach consists of i. An online system with stateful model based checkers (SMBCs) that helps utilities monitor EDS protocol communication contexts and flag abnormal session behaviors; ii. An offline framework that security tool developers, operators, and auditors can use to verify security properties (leverages formal methods). The modular design of the ADEC-G online system enables its easy extension to cover added protocol features, to introduce new monitoring capabilities, and to apply to additional communication protocols. Its monitoring capabilities and user interface features also facilitate visibilities into ongoing communication patterns and quick grasps of suspicious communication activities. The offline framework provides a platform not only for rigorous validation of security coverage, but also for systematic refinement of checker design leveraging the counter traces generated by the model checking tool. The ADEC-G online monitoring/detection system and the offline validation framework are both operational and have been demonstrated in various settings. The ADEC-G online system has also been integrated into TTGS SecureSmart Managed Security Services offering and been employed to perform security assessment in a section of a utilitys operational network as well as in other Smart Grid security pilot project offerings. TTGS is also in discussions with several system integrators for incorporating the integrated SecureSmart Managed Security Services offering as the cyber security solution for the nce of Operations Technology (OT) and Information Technology (IT).

  19. A Cyber Security Study of a SCADA Energy Management System: Stealthy

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State of state estimators in supervisory control and data acquisition (SCADA) systems for energy management on a state-of-the-art SCADA EMS software for a power network example with 14 substations, 27 buses, and 40

  20. Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems Sk. Md, University of Tsukuba, Tsukuba, 305-8573 Japan okamoto@risk.tsukuba.ac.jp ABSTRACT A peer-to-peer database augments a conventional database man- agement system with an inter-operability layer (i.e. map- pings

  1. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1 Zenebe: Department of Management Information Systems,Bowie State University,14000 Jericho Park Road - 3, 2009 ISBN 1-933510-96-7/$15.00 2009 CISSE Abstract The Maryland Alliance for Information

  2. Extension Investment Option 2015-17 Food Systems, Food Security, Food Safety

    E-Print Network [OSTI]

    Tullos, Desiree

    Extension Investment Option 2015-17 Food Systems, Food Security, Food Safety The Statewide Need: Food is complicated--culturally, politically, and economically. A food systems approach is a key the foundational strengths of OSU Extension and its delivery model in communities and across the state. Food

  3. AgSec: Secure and Efficient CDMA-based Aggregation for Smart Metering Systems

    E-Print Network [OSTI]

    Namboodiri, Vinod

    . For instance, it can be easily determined if a This work was supported in part by the Power Systems EngineeringAgSec: Secure and Efficient CDMA-based Aggregation for Smart Metering Systems Navid Alamatsaz and energy. Hence, utilizing data aggregation algorithms, the limited bandwidth can be efficiently utilized

  4. High-end Home Firewalls CIAC-2326

    SciTech Connect (OSTI)

    Orvis, W

    2003-10-08

    Networking in most large organizations is protected with corporate firewalls and managed by seasoned security professionals. Attempts to break into systems at these organizations are extremely difficult to impossible for an external intruder. With the growth in networking and the options that it makes possible, new avenues of intrusion are opening up. Corporate machines exist that are completely unprotected against intrusions, that are not managed by a security professional, and that are regularly connected to the company network. People have the option of and are encouraged to work at home using a home computer linked to the company network. Managers have home computers linked to internal machines so they can keep an eye on internal processes while not physically at work. Researchers do research or writing at home and connect to the company network to download information and upload results. In most cases, these home computers are completely unprotected, except for any protection that the home user might have installed. Unfortunately, most home users are not security professionals and home computers are often used by other family members, such as children downloading music, who are completely unconcerned about security precautions. When these computers are connected to the company network, they can easily introduce viruses, worms, and other malicious code or open a channel behind the company firewall for an external intruder.

  5. Impact of Security on Power Systems Operation MOHAMMAD SHAHIDEHPOUR, FELLOW, IEEE, WILLIAM F. TINNEY, LIFE FELLOW, IEEE, AND

    E-Print Network [OSTI]

    Fu, Yong

    on the standard market design (SMD) in restructured electric power systems provide an opportunity for electricityImpact of Security on Power Systems Operation MOHAMMAD SHAHIDEHPOUR, FELLOW, IEEE, WILLIAM F on the operation and the planning of restructured power systems. The paper is focused on the static security rather

  6. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems securityTrust: An Element of Information Security, in Security andInternational Journal of Information Security, vol. 4, pp.

  7. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART A: SYSTEMS AND HUMANS, VOL. 36, NO. 3, MAY 2006 429 Secure Knowledge Management

    E-Print Network [OSTI]

    Sandhu, Ravi

    will be explored. Index Terms--Data mining, privacy, role-based access control (RBAC), secure knowledge management, multimedia, collaboration, and the web. Therefore, security in web data management, multi- media systems is main- taining security. Knowledge management includes many tech- nologies such as data mining

  8. Electronic DOE Information Security System (eDISS) PIA, Office...

    Broader source: Energy.gov (indexed) [DOE]

    Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory Occupational Injury & Illness System...

  9. Guest Editorial Safety, reliability and security of industrial computer systems

    E-Print Network [OSTI]

    Felici, Massimo

    different stakeholders who drive the system life cycle as well as the dependability system requirements to certification, deployment, evaluation, evolution, and decommission in the system life cycle. There are two be tempted to looking for a universal model that may be used throughout the entire life cycle. A universal

  10. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  11. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect (OSTI)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    AbstractThis paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  12. Recommended Practice for Securing Control System Modems | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Modems This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone...

  13. ORO Office Safeguards and Security Clearance Tracking System...

    Energy Savers [EERE]

    System PIA, Oak Ridge Operations Office More Documents & Publications Occupational Medicine - Assistant PIA, Idaho National Laboratory ORO Verification of Employment Tracking...

  14. CPSC 601.xx: Information Systems Security Analysis Statement of Ethical Considerations

    E-Print Network [OSTI]

    Locasto, Michael E.

    permission and informed consent of the system's owner. Ethical Hacking Principles Hacking is, unfortunately misuse of the special skills they possess. Similarly, hacking is a special technological skill that can the term "hacking" to refer to the skill to question security and trust assumptions expressed in software

  15. Speeding up a Risk-based Security Assessment Method for Electrical Power Systems

    E-Print Network [OSTI]

    Vuik, Kees

    market; higher in-feed from renewable energy sources (RES) such as wind and solar. To ensure secure because of wind and solar in-feeds and the fluctuating demand from the consumer side. In order of the Umbrella project in which RBSA methods are being developed and the impact of smart components on the system

  16. SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System, it is of critical importance to out- source the data to cloud servers, which provides users an easy, cost-effective and flexible way to manage data. Whereas, users lose control on their data once outsourcing their data to cloud

  17. Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus

    E-Print Network [OSTI]

    Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus by re-dispatching generator outputs, using a normal vector found at a voltage collapse boundary or a low voltage boundary (LVB). This method uses the normal vector as an indicator to change the generation

  18. Memory Security Management for Reconfigurable Embedded Systems Romain Vaslin, Guy Gogniat,

    E-Print Network [OSTI]

    Gaj, Krzysztof

    -Philippe Diguet European University of Brittany UBS - Lab-STICC Lorient, 56100, FRANCE vaslin@univ-ubs.fr Russell processor running the MicroC/OS II operating system. An average memory and energy savings of about 64, the implementation of specific security policies in FPGAs [3] has only recently received attention. As FPGA use

  19. North American Electricity Infrastructure: System Security, Quality, Reliability, Availability, and Efficiency

    E-Print Network [OSTI]

    Amin, S. Massoud

    1 North American Electricity Infrastructure: System Security, Quality, Reliability, Availability for reliable and disturbance-free electricity. The massive power outages in the United States, Canada, UK and Italy in 2003 underscored electricity infrastructure's vulnerabilities [1-11]. This vital yet complex

  20. SECURE MODIFICATION TO A FILE PROTECTION SYSTEM THAT USES A FINGERPRINT IDENTIFICATION TECHNIQUE

    E-Print Network [OSTI]

    , kindness, and friendship. Also, I would like to give special thanks to my family, especially my mother, executive members, and/or scientists of a company. The main purpose is to help a company maintain problems. People are afraid that someone could steal their data or hack into their systems. Data security

  1. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid

    E-Print Network [OSTI]

    Lee, Eun Kyu

    2014-01-01

    Security in Wireless Smart Grid . . . . . . . . . . . . . . . .Guidelines for Smart Grid Cyber Security. Sep. 2010. [84] M.Control in Smart Grid Cyber security is one of the cross-

  2. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid

    E-Print Network [OSTI]

    Lee, Eun Kyu

    2014-01-01

    Electric Sector Cyber- security Organization Resource (Grid Interoperability Panel - Cyber Security Working Group.Guidelines for Smart Grid Cyber Security. Sep. 2010. [84] M.

  3. Regional Radiological Security Partnership in Southeast Asia Increasing the Sustainability of Security Systems at the Site-Level by Using a Model Facility Approach

    SciTech Connect (OSTI)

    Chamberlain, Travis L.; Dickerson, Sarah; Ravenhill, Scott D.; Murray, Allan; Morris, Frederic A.; Herdes, Gregory A.

    2009-10-07

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO), created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energys Global Threat Reduction Initiative (GTRI) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP is to cooperate with countries in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports objectives to improve the security of high risk radioactive sources by raising awareness of the need and developing national programs to protect and control such materials, improve the security of such materials, and recover and condition the materials no longer in use. The RRSP has utilized many tools to meet those objectives including: provision of physical protection upgrades, awareness training, physical protection training, regulatory development, locating and recovering orphan sources, and most recently - development of model security procedures at a model facility. This paper discusses the benefits of establishing a model facility, the methods employed by the RRSP, and three of the expected outcomes of the Model Facility approach. The first expected outcome is to increase compliance with source security guidance materials and national regulations by adding context to those materials, and illustrating their impact on a facility. Second, the effectiveness of each of the tools above is increased by making them part of an integrated system. Third, the methods used to develop the model procedures establishes a sustainable process that can ultimately be transferred to all facilities beyond the model. Overall, the RRSP has utilized the Model Facility approach as an important tool to increase the security of radioactive sources, and to position facilities and countries for the long term secure management of those sources.

  4. Abstract--We describe an inexpensive in-home monitoring system designed to assist patients with traumatic

    E-Print Network [OSTI]

    Minnesota, University of

    Abstract-- We describe an inexpensive in-home monitoring system designed to assist patients wireless sensors, including motion, pressure, door, flow, accelerometer, magnetometer, temperature, light daily activities in a home setting. In particular, the system is intended to help such patients plan

  5. A publication presented by the Electrical Safety Foundation International A guide to understanding and maintaining your home's electrical system

    E-Print Network [OSTI]

    Quigg, Chris

    A publication presented by the Electrical Safety Foundation International A guide to understanding and maintaining your home's electrical system #12;Should You Do-It-Yourself? Is a Permit or Inspection Required? How Much Energy Does My Home Use? How Does My Electrical System Work? What's Inside My Service Panel

  6. Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary

    SciTech Connect (OSTI)

    Hu, Tan Chang; Robinson, David G.

    2011-09-08

    As the national focus on cyber security increases, there is an evolving need for a capability to provide for high-speed sensing of events, correlation of events, and decision-making based on the adverse events seen across multiple independent large-scale network environments. The purpose of this Shared Vision project, Cyber Security Indications and Warning System, was to combine both Sandia's and LMC's expertise to discover new solutions to the challenge of protecting our nation's infrastructure assets. The objectives and scope of the proposal was limited to algorithm and High Performance Computing (HPC) model assessment in the unclassified environment within funding and schedule constraints. The interest is the identification, scalability assessment, and applicability of current utilized cyber security algorithms as applied in an HPC environment.

  7. The use of information technology security assessment criteria to protect specialized computer systems

    SciTech Connect (OSTI)

    Lykov, V.A.; Shein, A.V.; Piskarev, A.S.; Devaney, D.M.; Melton, R.B.; Hunteman, W.J.; Prommel, J.M.; Rothfuss, J.S.

    1997-10-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry.

  8. The theory of diversity and redundancy in information system security : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Pierson, Lyndon George

    2010-10-01

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  9. Home Energy Score API User: CakeSystems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12,ExecutiveFinancingR Walls - Building America TopatheProgram Home Energy

  10. Effects of Home Energy Management Systems on Distribution Utilities and Feeders Under Various Market Structures: Preprint

    SciTech Connect (OSTI)

    Ruth, Mark; Pratt, Annabelle; Lunacek, Monte; Mittal, Saurabh; Wu, Hongyu; Jones, Wesley

    2015-07-17

    The combination of distributed energy resources (DER) and retail tariff structures to provide benefits to both utility consumers and the utilities is poorly understood. To improve understanding, an Integrated Energy System Model (IESM) is being developed to simulate the physical and economic aspects of DER technologies, the buildings where they reside, and feeders servicing them. The IESM was used to simulate 20 houses with home energy management systems on a single feeder under a time of use tariff to estimate economic and physical impacts on both the households and the distribution utilities. HEMS reduce consumers electric bills by precooling houses in the hours before peak electricity pricing. Household savings are greater than the reduction utility net revenue indicating that HEMS can provide a societal benefit providing tariffs are structured so that utilities remain solvent. Utilization of HEMS reduce peak loads during high price hours but shifts it to hours with off-peak and shoulder prices and resulting in a higher peak load.

  11. Home energy rating system business plan feasibility study in Washington state

    SciTech Connect (OSTI)

    Lineham, T.

    1995-03-01

    In the Fall of 1993, the Washington State Energy Office funded the Washington Home Energy Rating System project to investigate the benefits of a Washington state HERS. WSEO established a HERS and EEM Advisory Group. Composed of mortgage lenders/brokers, realtors, builders, utility staff, remodelers, and other state agency representatives, the Advisory Group met for the first time on November 17, 1993. The Advisory Group established several subcommittees to identify issues and options. During its March 1994 meeting, the Advisory Group formed a consensus directing WSEO to develop a HERS business plan for consideration. The Advisory Group also established a business plan subcommittee to help draft the plan. Under the guidance of the business plan subcommittee, WSEO conducted research on how customers value energy efficiency in the housing market. This plan represents WSEO`s effort to comply with the Advisory Group`s request. Why is a HERS Business Plan necessary? Strictly speaking this plan is more of a feasibility plan than a business plan since it is designed to help determine the feasibility of a new business venture: a statewide home energy rating system. To make this determination decision makers or possible investors require strategic information about the proposed enterprise. Ideally, the plan should anticipate the significant questions parties may want to know. Among other things, this document should establish decision points for action.

  12. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  13. Security-Constrained Adequacy Evaluation of Bulk Power System Reliability

    E-Print Network [OSTI]

    contingency selection, (b) effects analysis, and (c) reliability index computation. Effects analysis as an optimization problem with the objective function being the bid cost function and congestion constraints and reliability index computations. The methodology is demonstrated with the IEEE reliability test system. Index

  14. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  15. Integrated Heat Pump HVAC Systems for Near-Zero-Energy Homes - Business Case Assessment

    SciTech Connect (OSTI)

    Baxter, Van D

    2007-05-01

    The long range strategic goal of the Department of Energy's Building Technologies (DOE/BT) Program is to create, by 2020, technologies and design approaches that enable the construction of net-zero energy homes at low incremental cost (DOE/BT 2005). A net zero energy home (NZEH) is a residential building with greatly reduced needs for energy through efficiency gains, with the balance of energy needs supplied by renewable technologies. While initially focused on new construction, these technologies and design approaches are intended to have application to buildings constructed before 2020 as well resulting in substantial reduction in energy use for all building types and ages. DOE/BT's Emerging Technologies (ET) team is working to support this strategic goal by identifying and developing advanced heating, ventilating, air-conditioning, and water heating (HVAC/WH) technology options applicable to NZEHs. Although the energy efficiency of heating, ventilating, and air-conditioning (HVAC) equipment has increased substantially in recent years, new approaches are needed to continue this trend. Dramatic efficiency improvements are necessary to enable progress toward the NZEH goals, and will require a radical rethinking of opportunities to improve system performance. The large reductions in HVAC energy consumption necessary to support the NZEH goals require a systems-oriented analysis approach that characterizes each element of energy consumption, identifies alternatives, and determines the most cost-effective combination of options. In particular, HVAC equipment must be developed that addresses the range of special needs of NZEH applications in the areas of reduced HVAC and water heating energy use, humidity control, ventilation, uniform comfort, and ease of zoning. In FY05 ORNL conducted an initial Stage 1 (Applied Research) scoping assessment of HVAC/WH systems options for future NZEHs to help DOE/BT identify and prioritize alternative approaches for further development. Eleven system concepts with central air distribution ducting and nine multi-zone systems were selected and their annual and peak demand performance estimated for five locations: Atlanta (mixed-humid), Houston (hot-humid), Phoenix (hot-dry), San Francisco (marine), and Chicago (cold). Performance was estimated by simulating the systems using the TRNSYS simulation engine (Solar Energy Laboratory et al. 2006) in two 1800-ft{sup 2} houses--a Building America (BA) benchmark house and a prototype NZEH taken from BEopt results at the take-off (or crossover) point (i.e., a house incorporating those design features such that further progress towards ZEH is through the addition of photovoltaic power sources, as determined by current BEopt analyses conducted by NREL). Results were summarized in a project report, 'HVAC Equipment Design options for Near-Zero-Energy Homes--A Stage 2 Scoping Assessment', ORNL/TM-2005/194 (Baxter 2005). The 2005 study report describes the HVAC options considered, the ranking criteria used, and the system rankings by priority. Table 1 summarizes the energy savings potential of the highest scoring options from the 2005 study for all five locations. All system options were scored by the ORNL building equipment research team and by William Goetzler of Navigant Consulting. These scores were reviewed by DOE/BT's Residential Integration program leaders and Building America team members. Based on these results, the two centrally ducted integrated heat pump (IHP) systems (air source and ground source versions) were selected for advancement to Stage 2 (Exploratory Development) business case assessments in FY06. This report describes results of these business case assessments. It is a compilation of three separate reports describing the initial business case study (Baxter 2006a), an update to evaluate the impact of an economizer cooling option (Baxter 2006b), and a second update to evaluate the impact of a winter humidification option (Baxter 2007). In addition it reports some corrections made subsequent to release of the first two reports to correct so

  16. An efficient wireless power transfer system with security considerations for electric vehicle applications

    SciTech Connect (OSTI)

    Zhang, Zhen; Chau, K. T. Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-05-07

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  17. Building America Top Innovations 2013 Profile … HPXML: A Standardized Home Performance Data Sharing System

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics AndBerylliumDepartmentResolution ofBETTER|BrianOvercoat: Airtightness3. Effective Guidance

  18. July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted Attic9: HSS Focus Group

  19. A systems-theoretic security model for large scale, complex systems applied to the US air transportation system

    E-Print Network [OSTI]

    Laracy, Joseph R. (Joseph Raymond)

    2007-01-01

    Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from ...

  20. 52 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 28, NO. 1, FEBRUARY 2013 Adaptive Robust Optimization for the Security

    E-Print Network [OSTI]

    Bertsimas, Dimitris

    for the Security Constrained Unit Commitment Problem Dimitris Bertsimas, Member, IEEE, Eugene Litvinov, Senior Abstract--Unit commitment, one of the most critical tasks in electric power system operations, faces new a two-stage adaptive robust unit commitment model for the security constrained unit commitment problem

  1. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 15: Security

    E-Print Network [OSTI]

    Bezrukov, Sergei

    with Java 7th Edition, Nov 15, 2006 Chapter 15: Security The Security Problem Program Threats System Edition, Nov 15, 2006 Program Threats Trojan Horse Code segment that misuses its environment Exploits Edition, Nov 15, 2006 C Program with Buffer-overflow Condition #12;15.10 Silberschatz, Galvin and Gagne

  2. Recommendations for Enhancing the U.S. Visa System to Advance America's Scientific and Economic Competitiveness and National Security Interests

    E-Print Network [OSTI]

    Knowles, David William

    Competitiveness and National Security Interests May 18, 2005 Following the terrorist attacks of September 11, 2001, national security, and higher education and scientific enterprises. These misperceptions must be dispelled, the U.S. government put in place new safeguards in the nation's visa system that made it extremely

  3. Cyber safety : a systems thinking and systems theory approach to managing cyber security risks

    E-Print Network [OSTI]

    Salim, Hamid M

    2014-01-01

    If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet ...

  4. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    21] ZigBee Alliance. "ZigBee Smart Energy V2.0, 2011 [22]Secure remote access to Smart Energy Home area Networks,Density HEMS SEP Smart Energy Profile HV Home Energy

  5. Cyberspace Security Econometrics System (CSES) - U.S. Copyright TXu 1-901-039

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Schlicher, Bob G; Sheldon, Frederick T; Lantz, Margaret W; Hauser, Katie R

    2014-01-01

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. The Cyberspace Security Econometrics System (CSES) provides a measure (i.e., a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement. The basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings contained in this copyright.

  6. Access Control for Home Data Sharing: Attitudes, Needs and Practices

    E-Print Network [OSTI]

    Bauer, Lujo

    these findings and present a set of associated guidelines for designing usable access- control systems- tal models of access control and security are often misaligned with current systems. We detail organizations have system administrators to set up and maintain access-control policies, but home users typ

  7. Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop

    E-Print Network [OSTI]

    Lders, S

    2011-01-01

    Over the last decade modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. The Stuxnet worm of 2010 against a particular Siemens PLC is a unique example for a sophisticated attack against control systems [1]. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data being ...

  8. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  9. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    and implementation of smart home energy management systemsStandard Technologies for Smart Home Area Networks EnablingInteroperability framework for smart home systems, Consumer

  10. To appear in ACM Transactions on Information and System Security, ACM, 2004. An extended abstract of this paper appeared in Ninth ACM Conference on Computer and Communications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    To appear in ACM Transactions on Information and System Security, ACM, 2004. An extended abstract of this paper appeared in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. Breaking

  11. Tax Credits for Home Energy Improvements: If You Buy an Energy-Efficient Product or Renewable Energy System for Your Home, You May be Eligible for a Federal Tax Credit (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2010-05-01

    This two-page fact sheet provides an overview of 2010 federal tax credits for energy efficient products or renewable energy systems in the home.

  12. Sandia Energy - The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Center for SCADA Security Assets Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure...

  13. T-544: Cisco Security Advisory: Cisco Content Services Gateway

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland 2012SystemSecurity

  14. A Hierarchical Control Algorithm for Managing Electrical Energy Storage Systems in Homes Equipped with PV Power Generation

    E-Print Network [OSTI]

    Pedram, Massoud

    A Hierarchical Control Algorithm for Managing Electrical Energy Storage Systems in Homes Equipped with PV Power Generation Yanzhi Wang, Siyu Yue, and Massoud Pedram Department of Electrical Engineering}@sharplabs.com Abstract-- Integrating residential-level photovoltaic (PV) power generation and energy storage systems

  15. A national program for energy-efficient mortgages and home energy rating systems: A blueprint for action

    SciTech Connect (OSTI)

    Not Available

    1992-03-01

    This Review Draft reports findings and recommendations of the National Collaborative on Home Energy Rating Systems and Mortgage Incentives for Energy Efficiency. The US Department of Energy, in cooperation with the US Department of Housing and Urban Development, formed this National Collaborative as a National Energy Strategy initiative. Participating in the Collaborative were representatives of the primary and secondary mortgage markets, builder and remodeler organizations, real estate and appraiser associations, the home energy rating system industry, utility associations, consumer and public interest groups, state and local government interest groups, and environmental organizations. The Collaborative's purpose was to develop a voluntary national program encouraging energy efficiency in homes through mortgage incentives linked to home energy ratings.

  16. Energy-efficient mortgages and home energy rating systems: A report on the nation`s progress

    SciTech Connect (OSTI)

    Farhar, B.C.; Eckert, J.

    1993-09-01

    This report summarizes progress throughout the nation in establishing voluntary programs linking home energy rating systems (HERS) and energy-efficient mortgages (EEMs). These programs use methods for rating the energy efficiency of new and existing homes and predicting energy cost savings so lenders can factor in energy cost savings when underwriting mortgages. The programs also encourage lenders to finance cost-effective energy-efficiency improvements to existing homes with low-interest mortgages or other instruments. The money saved on utility bills over the long term can more than offset the cost of such energy-efficiency improvements. The National Collaborative on HERS and EEMs recommended that this report be prepared.

  17. A Secured Health Care Application Architecture for Cyber-Physical Systems

    E-Print Network [OSTI]

    Wang, Jin; Lee, Sungyoung; Shu, Lei; Xia, Feng

    2012-01-01

    Cyber-physical systems (CPS) can be viewed as a new generation of systems with integrated control, communication and computational capabilities. Like the internet transformed how humans interact with one another, cyber-physical systems will transform how people interact with the physical world. Currently, the study of CPS is still in its infancy and there exist many research issues and challenges ranging from electricity power, health care, transportation and smart building etc. In this paper, an introduction of CPeSC3 (cyber physical enhanced secured wireless sensor networks (WSNs) integrated cloud computing for u-life care) architecture and its application to the health care monitoring and decision support systems is given. The proposed CPeSC3 architecture is composed of three main components, namely 1) communication core, 2) computation core, and 3) resource scheduling and management core. Detailed analysis and explanation are given for relevant models such as cloud computing, real time scheduling and secu...

  18. Renovated Korean nuclear safety and security system: A review and suggestions to successful settlement

    SciTech Connect (OSTI)

    Chung, W. S.; Yun, S. W.; Lee, D. S.; Go, D. Y.

    2012-07-01

    Questions of whether past nuclear regulatory body of Korea is not a proper system to monitor and check the country's nuclear energy policy and utilization have been raised. Moreover, a feeling of insecurity regarding nuclear safety after the nuclear accident in Japan has spread across the public. This has stimulated a renovation of the nuclear safety regime in Korea. The Nuclear Safety and Security Commission (NSSC) was launched on October 26, 2011 as a regulatory body directly under the President in charge of strengthening independence and nuclear safety. This was a meaningful event as the NSSC it is a much more independent regulatory system for Korea. However, the NSSC itself does not guarantee an enhanced public acceptance of the nuclear policy and stable use nuclear energy. This study introduces the new NSSC system and its details in terms of organization structure, appropriateness of specialty, budget stability, and management system. (authors)

  19. SunShot Installs Solar Energy System on Local Habitat for Humanity Home |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|inWestMayBuilding K-25KyleEnergyHangoutSunShotDepartment of

  20. Could Your Home Benefit from a Small Wind Electric System? | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment of EnergyResearchersOctoberCharles DOEJungle

  1. Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems Kyoung-Don Kang

    E-Print Network [OSTI]

    Kang, Kyoung-Don

    security requirements in soft real-time applications such as battlefield monitoring and target track- ing

  2. Bureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Mary FLOOD WARNING SYSTEM

    E-Print Network [OSTI]

    Greenslade, Diana

    Risk Previous Flooding Flood Forecasting Local Information Flood Warnings and Bulletins Interpreting Flood Warnings and River Height Bulletins Flood Classifications Other Links Flood RiskBureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Mary FLOOD

  3. Bureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Nerang FLOOD WARNING SYSTEM

    E-Print Network [OSTI]

    Greenslade, Diana

    is information about: (Last updated June 2015) Flood Risk Previous Flooding Flood Forecasting Local Height Bulletins Flood Classifications Other Links Flood Risk The Nerang River catchment is locatedBureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Nerang FLOOD

  4. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security, ACM Journal onWorld Conference on Information Security Education pp. 23Colloquium on Information Systems Security Education (CISSE)

  5. Reactor and Nuclear Systems Division (RNSD)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    RNSD Home Research Groups Advanced Reactor Systems & Safety Nuclear Data & Criticality Safety Nuclear Security Modeling Radiation Safety Information Computational Center Radiation...

  6. Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage

    E-Print Network [OSTI]

    for sensitive data over cloud storage. However, users desire better security and are ready to pay for services storage systems. General Terms Human Factors, Security, Privacy. Keywords Cloud Storage, Social FactorsHome is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage Iulia Ion , Niharika

  7. Transportation Security | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE- Non-ResidentialAlliantPGEDepartmentfan system' %ManufacturingPackagingSecurity

  8. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  9. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  10. Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic Center: Email Security Compliance Patch Management Financial Services Health care RSA 2008 RSS | Login | Register

    E-Print Network [OSTI]

    Gupta, Minaxi

    SEARCH Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic located the malicious files, mostly MP3 or AVI in format, on popular peer-to- peer (P2P) websites appear when users employ certain terms when searching for music and video, he said. Once the files

  11. An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California

    E-Print Network [OSTI]

    Hoen, Ben

    2011-01-01

    of the PV system (i.e. , the cost of PV installation afterthe average net installed cost of PV systems has varied tolower average installed cost than PV systems installed on

  12. Synchronization of time delay systems using variable delay with reset for enhanced security in communication

    E-Print Network [OSTI]

    G. Ambika; R. E. Amritkar

    2010-07-01

    We have introduced a mechanism for synchronizing chaotic systems by one way coupling with a variable delay that is reset at finite intervals. Here we extend this method to time delay systems and suggest a new cryptosystem based on this. We present the stability analysis as applied to time delay systems and supplement this by numerical simulations in a standard time delay system like Mackey Glass system. We extend the theory to multi- delay systems and propose a bi channel scheme for the implementation of the scheme for communication with enhanced security. We show that since the synchronizing channel carries information from transmitter only at intervals of reset time, it is not susceptible to reconstruction. The message channel being separate can be made complex by linear combination of transmitter variable at different delay times using mutiple delay systems. This method has the additional advantage that it can be adjusted to be delay or anticipatory in synchronization and these provide two additional basic keys that are independent of system delay.

  13. Challenges in Securing the Interface Between the Cloud and Pervasive Systems

    SciTech Connect (OSTI)

    Lagesse, Brent J

    2011-01-01

    Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources and issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.

  14. Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices

    E-Print Network [OSTI]

    Hoen, Ben

    2013-01-01

    Residential Photovoltaic Energy Systems in California: Thethe marginal impacts of photovoltaic (PV) energy systems ons largest market for photovoltaic solar (PV), with nearly

  15. Exploring California PV Home Premiums

    E-Print Network [OSTI]

    Hoen, Ben

    2014-01-01

    of Photovoltaic Energy Systems on Residential Selling PricesResidential Photovoltaic Energy Systems on Home Sales PricesResidential Photovoltaic Energy Systems on Home Sales Prices

  16. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01

    of smart home energy management systems based on zigbee,Networks Enabling Energy Management Systems , Universities'Profile HV Home Energy Management System High Voltage SNR

  17. Bureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Kolan FLOOD WARNING SYSTEM

    E-Print Network [OSTI]

    Greenslade, Diana

    is information about: (Last updated June 2015) Flood Risk Previous Flooding Flood Forecasting Local Classifications Other Links Flood Risk The Kolan River catchment is located in south east Queensland and coversBureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Kolan FLOOD

  18. Bureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Bulloo FLOOD WARNING SYSTEM

    E-Print Network [OSTI]

    Greenslade, Diana

    in this document is information about: (Last updated June 2015) Flood Risk Previous Flooding Flood Bulletins Flood Classifications Other Links Flood Risk The Bulloo River catchment is located in southBureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Bulloo FLOOD

  19. Bureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Noosa FLOOD WARNING SYSTEM

    E-Print Network [OSTI]

    Greenslade, Diana

    is information about: (Last updated June 2015) Flood Risk Previous Flooding Flood Forecasting Local Height Bulletins Flood Classifications Other Links Flood Risk The Noosa River has a catchment areaBureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Noosa FLOOD

  20. Bureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Paroo FLOOD WARNING SYSTEM

    E-Print Network [OSTI]

    Greenslade, Diana

    is information about : (Last updated June 2015) Flood Risk Previous Flooding Flood Forecasting Local Classifications Other Links Flood Risk The Paroo River catchment is located in south west Queensland and coversBureau Home > Australia > Queensland > Rainfall & River Conditions > River Brochures > Paroo FLOOD