Sample records for information security management

  1. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Environmental Management (EM)

    INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

  2. Enterprise Information Security Management Framework [EISMF

    E-Print Network [OSTI]

    Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

    2011-01-01T23:59:59.000Z

    There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

  3. RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS

    E-Print Network [OSTI]

    organizational managers in making informed decisions regarding the security of their information systems. NIST agencies implementing risk-based planning and management also must consider effectiveness, efficiency for their information and information systems with the gains in capabilities and improved support of organizational

  4. The Relationship Between Information Security and Fraud Risk Management

    E-Print Network [OSTI]

    Huang, Jianwei

    of Regional Security & Fraud Risk HSBC THE CHINESE UNIVERSITY OF HONG KONG Department of Information current role in HSBC, as the Head of Regional Security & Fraud for Asia Pacific involves financial crime

  5. MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

    E-Print Network [OSTI]

    a well-defined process for managing and controlling secure system configurations, and for managing risks, and the integration of security into the configuration management process throughout the life cycle of the system for establishing secure configurations in information systems; flow charts for SecCM processes and activities

  6. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation抯 security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  8. Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1 THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li in the economic incentives inherent in providing the defenses as well as uncertainty in current defenses. We

  9. Implementing Information Security and Its Technology: A LineManagement Perspective

    SciTech Connect (OSTI)

    Barletta, William A.

    2005-08-22T23:59:59.000Z

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation抯 security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

  11. Management of Control System Information SecurityI: Control System Patch Management

    SciTech Connect (OSTI)

    Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

    2011-09-01T23:59:59.000Z

    The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  14. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Kolda, Tamara G.

    . Samatova, D. Speck, R. Srikant, J. Thomas, M. Wertheimer, P. C. Wong SANDIA REPORT SAND2004-6648 Unlimited Report of the DHS Workshop on Data Sciences September 22-23, 2004 Jointly released by Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  15. V-192: Symantec Security Information Manager Input Validation...

    Broader source: Energy.gov (indexed) [DOE]

    Input Validation Flaws U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks T-731:Symantec IM Manager Code Injection Vulnerability...

  16. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002OpticsPeriodical: VolumeIComplaints - GoldenDepartment of

  17. Quantifying and managing the risk of information security breaches participants in a supply chain

    E-Print Network [OSTI]

    Bellefeuille, Cynthia Lynn

    2005-01-01T23:59:59.000Z

    Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

  18. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  19. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  20. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  1. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  2. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  3. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  4. Department of Energy Cyber Security Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-21T23:59:59.000Z

    The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

  5. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04T23:59:59.000Z

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

  6. Information Resources Security Planning and Policy Committee -UTDPP1003

    E-Print Network [OSTI]

    O'Toole, Alice J.

    Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security Planning and Policy Committee Policy Statement The Information Resources Planning, and Policy a security plan to protect information identified as confidential, sensitive or both. 3. Assign management

  7. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

  8. Information Technology and Management Department of Information Technology and Management

    E-Print Network [OSTI]

    Heller, Barbara

    Information Technology and Management Department of Information Technology and Management Daniel F Chicago, IL 60616 appliedtech.iit.edu/information-technology-and- management Dean and Chair: C. Robert in the information technology and cyber security fields. The Information Technology and Management degrees apply

  9. Information Security: Coordination of Federal Cyber Security...

    Broader source: Energy.gov (indexed) [DOE]

    and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

  10. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. 路 Access control system implements Information Security Group Agenda 路 Access control basics 路 ACLs and capabilities 路 Information flow policies路 Information flow policies 路 Bell-LaPadula Model 路 Role-Based Access Control 路 Resources 3 Information Security

  11. AT&TSecurity Consulting Information Assurance Federal Information Security

    E-Print Network [OSTI]

    Fisher, Kathleen

    the security controls for the information system. The AT&T Consulting methodology is based on National in addressing industry best practices and provide Security Authorization Process, formerly Certification requirements under the Federal Information Security Management Act of 2002, of general support systems

  12. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  13. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  14. September 2004 INFORMATION SECURITY

    E-Print Network [OSTI]

    September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

  15. Security In Information Systems

    E-Print Network [OSTI]

    Candan, Sel莽uk

    rights, and they are proposing security policies, security planning, personal data protection laws, etc

  16. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  17. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  18. Information Resources Security Planning and Policy Committee -UTDPP1003

    E-Print Network [OSTI]

    O'Toole, Alice J.

    Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security it is confidential, sensitive, both or neither. 2. Prepare a security plan to protect information identified as confidential, sensitive or both. 3. Assign management responsibility for implementing the security plan. 4

  19. Homeland Security and Emergency Management Coordination (HSEMC...

    National Nuclear Security Administration (NNSA)

    Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  20. Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers

    E-Print Network [OSTI]

    Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

    2010-01-01T23:59:59.000Z

    The importance of safeguarding information created and shared on computers and the Internet has increased significantly in recent years, as society has become increasingly dependent on information technology in government, ...

  1. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  2. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  3. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  4. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01T23:59:59.000Z

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  5. Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr.

    E-Print Network [OSTI]

    Lee, Ruby B.

    , military, process control . K.6.5 [Management Of Computing And Information Systems]: Security/server, distributed applications, distributed databases. J.7 [Computers In Other Systems]: Command and control security, unauthorized access. General Terms Management, Design, Security. Keywords Access Control

  6. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  7. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  8. 06 DEC 2013 1 Information Security Guideline

    E-Print Network [OSTI]

    Queitsch, Christine

    responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

  9. Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY

    E-Print Network [OSTI]

    Code of Practice for Information Security Management (ISO/IEC 27002:2005) The international standard Electrotechnical Commission (IEC) A global organization that develops and publishes standards, the private sector, consumer groups, professional associations, and others. International Organization

  10. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  11. A Strategy for Information Security: TOGAF , A. Movasseghi2

    E-Print Network [OSTI]

    Ertaull, Levent

    Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

  12. Integrated safeguards and security management plan

    SciTech Connect (OSTI)

    Bowen, Sue, editor

    2001-04-16T23:59:59.000Z

    Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

  13. Integrated Safeguards and Security Management (ISSM) Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

  14. Third Annual Cyber Security and Information

    E-Print Network [OSTI]

    Krings, Axel W.

    Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

  15. Building an Information Technology Security Awareness

    E-Print Network [OSTI]

    Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

  16. Security Analysis and Project Management Systems | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

  17. T-614: Cisco Unified Communications Manager Database Security...

    Energy Savers [EERE]

    614: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis...

  18. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes program planning and management requirements for the Departments Safeguards and Security (S&S) Program. Cancels: DOE N 473.9 and DOE M 470.1-1

  19. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes program planning and management requirements for the Departments Safeguards and Security. Chg 1, dated 3-7-06 Cancels DOE N 473.9, DOE M 470.1-1 Chg 2.

  20. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01T23:59:59.000Z

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  1. Information Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for planningtoA JourneyISTI Information Science

  2. Electronic DOE Information Security System (eDISS) PIA, Office...

    Office of Environmental Management (EM)

    DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

  3. MSc and Postgraduate Diploma in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    of information security need internationally-recognised qualifications which How will the course help my career and understanding of What do employers say? Worldwide Access | Opportunity | International Standards qualifications. #12;`Attending my first Information Security supplier event after graduating made me reali

  4. Safeguards and Security Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-04-18T23:59:59.000Z

    The proposed revision to this Department of Energy Guide focuses on alignment of guidance for implementing key safeguard and security components to the DOE capital asset acquisition process with the revised DOE O 413.3B, Program and Project Management for Acquisition of Capital Assets, the revised DOE O 470.4B, Safeguard and Security Program, and the new series of DOE Orders replacing the DOE M 470.4 series of manuals.

  5. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-23T23:59:59.000Z

    The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Cancels DOE O 200.1.

  6. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15T23:59:59.000Z

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  7. Finance, IT Operations& InformationSecurity Dear Colleagues,

    E-Print Network [OSTI]

    -examine collectively the customer service aspect of our grant and contract management. A dozen SEAS members, including, is Information Technology. While Indir has stepped into the role of Interim IT Director to keep the proverbial and to check out interesting tips about securing mobile devices and avoiding phishing scams. Harry Dumay, Ph

  8. Find It. Delete It. Protect It. Information Technology Security Strategy

    E-Print Network [OSTI]

    Sheridan, Jennifer

    that security will be a process rather than project. Achievement of the goal, optimized risk management to external best practices and seek external advice on effectiveness. For critical processes and systems valuable information for governance. This process will achieve the long term Internal Controls Maturity

  9. U-200: Red Hat Directory Server Information Disclosure Security...

    Broader source: Energy.gov (indexed) [DOE]

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  10. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01T23:59:59.000Z

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  11. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect (OSTI)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01T23:59:59.000Z

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

  12. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes program planning and management requirements for the Department抯 Safeguards and Security (S&S) Program. Change 2 is a revision to Section M of both the Manual and the CRD to realign the process for establishing deviations from DOE directives containing safeguards and security requirements to reflect established Departmental policy as set forth in DOE O 251.1C. Original publication, 8-26-05; Chg 1, 3-7-06. Canceled by DOE O 470.4B

  13. Information Collection Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-11T23:59:59.000Z

    This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

  14. Smart Grid Information Security (IS) Functional Requirement

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01T23:59:59.000Z

    It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entire grid. The background of smart information infrastructure and the needs for smart grid IS is described with the adoption of hermeneutic circle as methodology. Grid information technology and security-s session discusses that grid provides the chance of a simple and transparent access to different information sources. In addition, the transformation between traditional versus smart grid networking trend and the IS importance on the communication field reflects the criticality of grid IS functional requirement identification is introduces. The smart grid IS functional requirements described in this paper are general and ...

  15. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  16. Information & Records Management Process Manual

    E-Print Network [OSTI]

    Hickman, Mark

    several significant failures to manage information in the public sector in New Zealand, which the Official Information, Privacy, Copyright and Public Records Acts. How you manage UC informationInformation & Records Management Process Manual 2013Information and Records Management #12;Contents

  17. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03T23:59:59.000Z

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  18. Principles of Secure Information Flow Analysis Geoffrey Smith

    E-Print Network [OSTI]

    Smith, Geoffrey

    Principles of Secure Information Flow Analysis Geoffrey Smith School of Computing and Information to explain the #12;2 Geoffrey Smith principles underlying secure information flow analysis and to discuss

  19. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful with the guidance of their senior administrators. The re-organization in some of the finance offices continues the intranet site. #12;2 Harry Dumay, PhD MBA Chief Financial Officer/ Associate Dean for Finance

  20. Optimal Information Security Investment with Penetration Testing

    E-Print Network [OSTI]

    Bencs谩th, Boldizs谩r

    gathering prior to investing into protection against so-identified threats. Penetration testing is alsoOptimal Information Security Investment with Penetration Testing Rainer B篓ohme and M麓ark F麓elegyh麓azi International Computer Science Institute, Berkeley, California {rainer.boehme|mark}@icsi.berkeley.edu Abstract

  1. PRIVACY AND SECURITY OF PERSONAL INFORMATION

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Chapter 1 PRIVACY AND SECURITY OF PERSONAL INFORMATION Economic Incentives and Technological for many, the economic #12;2 incentives have not generated widespread adoption, and government in University acquisti@andrew.cmu.edu Abstract I discuss the evolution of the economic analysis of privacy

  2. Information Security Plan for Flight Simulator Applications

    E-Print Network [OSTI]

    Slaughter, Jason

    2011-01-01T23:59:59.000Z

    The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. We will be creating a system that will allow them to access their programs, back office and administrator functions remotely. A security plan outlining our security architecture will be delivered prior to the final code roll out. The plan will include responses to encryption used and the security architecture applied in the final documentation. The code will be delivered in phases to work out any issues that may occur during the implementation

  3. Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security

    E-Print Network [OSTI]

    Kim, Kwangjo

    Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

  4. Improving web site security with data flow management

    E-Print Network [OSTI]

    Yip, Alexander Siumann, 1979-

    2009-01-01T23:59:59.000Z

    This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or ...

  5. Ontological Mapping of Information Security Best-Practice Guidelines

    E-Print Network [OSTI]

    best-practice guidelines, security ontology, EBIOS, IT Grundschutz Manual. 1 Introduction In recent- schutz Manual [4] to the security ontology by [6]. 2 Ontological Mapping of Information Security Best-PracticeOntological Mapping of Information Security Best-Practice Guidelines Stefan Fenz, Thomas Pruckner

  6. Information Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30T23:59:59.000Z

    Provides a framework for managing information, information resources, and information technology investment, which supports the operating elements of the Department in the accomplishment of its missions and functions in both an efficient and effective manner and in accordance with Departmental policy. Cancels: DOE 1324.5B, DOE 5900.1A, DOE 1130.8A, DOE 1330.1D, DOE 1410.2, DOE 1450.3A, DOE 1700.1, DOE 1800.1A, DOE 5300.1C

  7. acquisition management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational NuclearhasAdministration goSecurity Administrationmanagement |

  8. National Interest Security Company NISC Formerly Technology Management...

    Open Energy Info (EERE)

    search Name: National Interest Security Company (NISC) (Formerly Technology & Management Services (TMS) Inc.) Place: Gaithersburg, Maryland Zip: 20879 Product: TMS provides...

  9. Los Alamos National Security LLC Selected to Manage Los Alamos...

    Energy Savers [EERE]

    be the management and operations contractor for Los Alamos National Laboratory in New Mexico. Los Alamos National Security LLC is a limited liability corporation made up of...

  10. Information Technology and Management Information Technology and Management

    E-Print Network [OSTI]

    Heller, Barbara

    Information Technology and Management Information Technology and Management IIT School of Applied Technology Daniel F. and Ada L. Rice Campus 201 E. Loop Road Wheaton, IL 60187 www.iit.edu/applied tech/ Dean Technology & Management program is to educate and inform students to prepare them to assume technical

  11. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    assessments of Security Controls in Information Systems To obtain better understanding of Agency- related to hardware, software, firmware) Security Controls in an Information System, to determine the extent to which/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Questions during C&A Process

  12. Center for Cyber-Security, Information Privacy, and Trust

    E-Print Network [OSTI]

    Squicciarini, Anna Cinzia

    Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

  13. Center for Cyber-Security, Information Privacy, and Trust

    E-Print Network [OSTI]

    Giles, C. Lee

    Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

  14. Information Technology Security Training Requirements Appendix A --Learning Continuum A-1

    E-Print Network [OSTI]

    employees Security Awareness All employees involved with IT systems Security Basics and Literacy Information control. By accrediting a system or application, a manager accepts the associated risk. Accreditation, and Installation Controls -- the process of assuring that adequate controls are considered, evaluated, selected

  15. LEGACY MANAGEMENT REQUIRES INFORMATION

    SciTech Connect (OSTI)

    CONNELL, C.W.; HILDEBRAND, R.D.

    2006-12-14T23:59:59.000Z

    ''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

  16. Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS

    E-Print Network [OSTI]

    Wang, Hai

    2010- 2011 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS Relevance and currency -- that is what drives the Aviation Safety and Security Program of the USC Viterbi that our core course, Aviation Safety Management Systems, is so necessary in ensuring the safety

  17. CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection...

    Broader source: Energy.gov (indexed) [DOE]

    (Lead) Christina "Chris" Rouleau Phone: 301-903-6227 Email: Christina.Rouleau@hq.doe.gov Information Collection Management Program (Lead) Deidra "Dee Dee" Wilkinson Phone:...

  18. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management`s goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  19. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management's goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  20. Information Security Framework for Small and Medium Sized Businesses

    E-Print Network [OSTI]

    Michnick, Steven M.

    2009-06-17T23:59:59.000Z

    prevalent risks to business information and commonly exploited security holes can quickly close the door to a security incident. Just as with traditional burglary attempts, the computer criminals will first look for the path of least resistance when trying...

  1. Modern Quantum Technologies of Information Security

    E-Print Network [OSTI]

    Korchenko, Oleksandr; Gnatyuk, Sergiy

    2010-01-01T23:59:59.000Z

    In the paper systematization and classification of modern quantum technologies of the information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of used quantum technologies is given. The qualitative analysis of advantages and disadvantages of concrete quantum protocols is made. The current status of a problem of practical quantum cryptography using in telecommunication networks is considered. In particular, the short review of existing commercial systems of quantum key distribution is given.

  2. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclearhas 'Natitude'SecurityAdministration rankedInformation | National

  3. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-14T23:59:59.000Z

    The Order establishes requirements and responsibilities for managing DOE's scientific and technical information. Cancels DOE O 241.1. Canceled by DOE O 241.1B.

  4. Group Security Association (GSA) Management in IP Multicast

    E-Print Network [OSTI]

    Thomas Hardjono; Mark Baugher; Hugh Harney

    Abstract: This work describes the Group Security Association (GSA) Management model and protocol as developed in the Secure Multicast Group (SMuG) in the IETF. The background reasoning from the Internet Key Exchange (IKE) protocol perspective is explained, together with the notion of Security Associations (SA) in the unicast case. This serves as a basis for a requirements for Group SA for multicast. Finally, the definition and construction of a GSA is described. 1.

  5. Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS

    E-Print Network [OSTI]

    Wang, Hai

    2011- 2012 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS of aviation safety. Endings signal new beginnings and new beginnings mean evolving challenges for safety. This was the world in which the USC Aviation Safety and Security Program was born in 1952 and this is the world

  6. Secure Streaming Media and Digital Rights Management Deepali Holankar

    E-Print Network [OSTI]

    Stamp, Mark

    Secure Streaming Media and Digital Rights Management Deepali Holankar Department of Computer of our secure streaming media system and we give some performance results. 1 #12;2 Digital rights. Company A only wants to allow paying customers to have access to the media stream. Digital rights

  7. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-11-15T23:59:59.000Z

    This Guide provides approaches for implementing security provisions within the functional areas contained in DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets. Canceled by DOE G 413.3-3A.

  8. NNSA Selects Consolidated Nuclear Security, LLC to Manage the...

    National Nuclear Security Administration (NNSA)

    to be the management and operating contractor for the Y-12 National Security Complex in Oak Ridge, Tenn., and the Pantex Plant near Amarillo, Texas. The contract also includes...

  9. The Department of Homeland Security Energy Management Program

    Energy Savers [EERE]

    Security Energy Management Program May 2, 2007 DHS Energy Program Overview Steven W. White, CEM May 2, 2007 2 Policy "It is the policy of the United States that Federal agencies...

  10. Security and Emergency Management Independent Oversight and Performance Assurance Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-03-01T23:59:59.000Z

    Establishes the DOE Security and Emergency Management Independent Oversight and Performance Assurance Program. Cancels DOE O 470.2, Paragraph 5b(2) of DOE O 231.1 and Chapter IV of DOE M 231.1-1.

  11. Selection of Model in Developing Information Security Criteria for Smart Grid Security System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01T23:59:59.000Z

    At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

  12. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  13. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

  14. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-11-21T23:59:59.000Z

    This revised Order is needed to clarify the roles and responsibilities, policies, and procedures for effectively managing IT investments to ensure mission success.

  15. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11T23:59:59.000Z

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  16. Training for Records and Information Management

    Broader source: Energy.gov [DOE]

    Records Management Training: NARA Records Management Training牋 NARA Targeted Assistance NARA Brochures Training Presentation: Information Collection Requests/PRA (pdf)

  17. Consequence Management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

  18. Information Management and Supporting Documentation

    Broader source: Energy.gov [DOE]

    The Paperwork Reduction Act (PRA) of 1995 requires each Federal agency to seek and obtain approval from the Office of Management and Budget (OMB) before undertaking a collection of information...

  19. Energy Management and Information Systems

    E-Print Network [OSTI]

    Conraud, J.

    2013-01-01T23:59:59.000Z

    ?infrastructure energy?audits,?HVAC?upgrades,? heat?recovery,?etc. Improve?operations processes?and?day?to?day? operations,?retro? commissioning ENERGY?MANAGEMENT?INFORMATION?SYSTEM the?project Hardware ? $3.0?million?investment ? 400+?meters...

  20. Records and Information Management Transition Guidance (November...

    Broader source: Energy.gov (indexed) [DOE]

    Records and Information Management Transition Guidance (November 2013) Records and Information Management Transition Guidance (November 2013) This guidance document establishes a...

  1. Monitoring informs management

    SciTech Connect (OSTI)

    West, Tristram O.

    2011-10-24T23:59:59.000Z

    Improved regional monitoring and reporting of greenhouse-gas emissions depends on accurate estimates of emissions from different land-use regimes. An analysis suggests that measuring emissions per crop yield may be an optimum metric for refining land-management decisions.

  2. Int. J. Information and Computer Security, Vol. 4, No. 4, 2011 365 Copyright 2011 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    one of the business process security leitmotifs. It defines a mechanism that bridges the gap between workflow and access control systems. Delegation completion and authorisation enforcement are specified in workflow management systems', Int. J. Information and Computer Security, Vol. 4, No. 4, pp.365

  3. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    management procedures that are applied through out the System Development Life Cycle (SDLC). This same

  4. project management | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions3 weProject

  5. Securely Managing Cryptographic Keys used within a Cloud Environment

    E-Print Network [OSTI]

    , Co-tenancy, Distributed Management Cryptography essential to secure cloud operations Use of sound;Page 3 Cloud Service Provider (CSP) - Models Cloud Service Models Software as a Service (Saa CSP know who I am? How is my connection to cloud components protected? Administration Who

  6. CAN INTEGRATED WATERSHED MANAGEMENT BRING GREATER FOOD SECURITY IN ETHIOPIA?

    E-Print Network [OSTI]

    Walter, M.Todd

    CAN INTEGRATED WATERSHED MANAGEMENT BRING GREATER FOOD SECURITY IN ETHIOPIA? Oloro V. McHugh, Amy S, Ethiopia Gete Zeleke ARARI, Bahir Dar, Ethiopia Abstract: In the food insecure regions, short annual. Ethiopia's agricultural sector is driven by the subsistence strategies of smallholder farmers

  7. TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop

    E-Print Network [OSTI]

    security 1. PROBLEM STATEMENT Software engineers used standard software engineering processes to develop of software are annoying, but delays of an hour are not catastrophic. But in certain environments (notably to use techniques, and--more importantly--how to analyze social, political, and cultural environments

  8. TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop

    E-Print Network [OSTI]

    Bishop, Matt

    security 1. PROBLEM S A EMEN Software engineers used standard software engineering processes to develop and scenarios drawn from political science, history, and other humanities to force students to apply or derive the process enjoyable, stimulating, and effective. Key words: environment, judgment, instruction, computer

  9. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and Operating (M&O) Contract Competition Program Information Program Information FY 2015 Performance Evaluation Plan (PEP) FY 2013 Performance Evaluation Report (PER)...

  10. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15T23:59:59.000Z

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  11. Information Flow for Secure Distributed Applications

    E-Print Network [OSTI]

    Cheng, Winnie Wing-Yee

    2009-08-27T23:59:59.000Z

    Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

  12. Information flow for secure distributed applications

    E-Print Network [OSTI]

    Cheng, Winnie Wing-Yee

    2009-01-01T23:59:59.000Z

    Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

  13. Vendor Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500IIVasudha Patri MechanicalofVehicles - ORNL

  14. Page 10, Security Forms and Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Para9EnvironmentalPage of 1 pages1 of

  15. Consequence Management | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User Group andCompositional Account InformationConquering4Consequence

  16. ORISE: National Security and Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Regionat CornellInternships, Scholarships and Fellowships ORISE CSEPP

  17. Information Collection Management | Department of Energy

    Office of Environmental Management (EM)

    Information Collection RequestsPRA (PDF) DOE Order 200.2 Information Collection Management Program - To set forth the Department of Energy (DOE) requirements and...

  18. TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27

    E-Print Network [OSTI]

    TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27.01.04 PROCEDURE STATEMENT This procedure establishes information resources security and management guidelines for all Texas Veterinary Medical Diagnostic Laboratory (TVMDL) positions. Reason for Procedure Under

  19. Information Security Analysis Using Game Theory and Simulation

    SciTech Connect (OSTI)

    Schlicher, Bob G [ORNL] [ORNL; Abercrombie, Robert K [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

  20. Information Systems Management (ISM) 2011 Department of Supply Chain & Information Systems

    E-Print Network [OSTI]

    Yener, Aylin

    Information Systems Management (ISM) 2011 Department of Supply Chain & Information Systems Information Systems Management Minor Application Overview The Information Systems Management focuses Systems Management and Applications c. MIS 431 (3) Business Data Management d. MIS 446 (3) Information

  1. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  2. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23T23:59:59.000Z

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Cancels DOE 5639.8.

  3. Roadmap: Computer Science Information Security -Bachelor of Science

    E-Print Network [OSTI]

    Sheridan, Scott

    Roadmap: Computer Science 颅 Information Security -Bachelor of Science [AS-BS-CS-INSE] College of Arts and Sciences Department of Computer Science Catalog Year: 2012颅2013 Page 1 of 2 | Last Updated: 3 Major GPA Important Notes Semester One: [16 Credit Hours] CS 13001 Computer Science I: Programming

  4. Office of the CISO, December 2010 Information Security Risk Advisory

    E-Print Network [OSTI]

    Queitsch, Christine

    Office of the CISO, December 2010 Information Security Risk Advisory Web Browsing Software attacks that exploit web browsers (e.g., Internet Explorer, Firefox, Safari, Chrome, Opera) are on the rise. Cyber criminals frequently attack web browsers to take control of computers, delete files, steal personally

  5. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    SciTech Connect (OSTI)

    None

    2005-03-02T23:59:59.000Z

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for former waste management units, legacy contamination source areas and distribution of contamination in soils, and environmental infrastructure (e.g., caps, monitoring systems, etc.) that is in place or planned in association with RAs. (3) Regulatory considerations and processes for management and disposition of waste soil upon generation, including regulatory drivers, best management practices (BMPs), waste determination protocols, waste acceptance criteria, and existing waste management procedures and BMPs for Y-12. This Soil Management Plan provides information to project planners to better coordinate their activities with other organizations and programs with a vested interest in soil disturbance activities at Y-12. The information allows project managers and maintenance personnel to evaluate and anticipate potential contaminant levels that may be present at a proposed soil disturbance site prior to commencement of activities and allows a more accurate assessment of potential waste management requirements.

  6. Contact Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartmentStewardshipAdministration helps|STEMChernobylMarchInformation |

  7. Area Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone by E-mailRadioimmunotherapyArchiveAre Earths Rare?Information

  8. Secure quantum private information retrieval using phase-encoded queries

    E-Print Network [OSTI]

    Olejnik, L

    2011-01-01T23:59:59.000Z

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries {[}Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that...

  9. Information Security: The Human Perspective Kathleen M. Carley

    E-Print Network [OSTI]

    Sadeh, Norman M.

    , redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing), CASOS 颅 the center for Computational Analysis of Social and Organizational Systems at Carnegie Mellon network and knowledge management approach to discovering organizational vulnerabilities within companies

  10. InformationTechnologies& BusinessandManagement

    E-Print Network [OSTI]

    Barrett, Jeffrey A.

    interactive planning Learn to transition your management style from rigid frameworks and plans to a cultureInformationTechnologies& BusinessandManagement extension.uci.edu/agile Agile Project Management standard of excellence. Agile Project Management Certificate Program Annual employer demand for individuals

  11. Information Technology Specialist (System Analysis/Information Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will provide the technical direction, planning, programming, implementation and operations of the Information Technology (IT) program for the Carlsbad Field...

  12. MANAGEMENT INFORMATION SYSTEMS (MIS) CONCENTRATION FOR UNDERGRADUATES

    E-Print Network [OSTI]

    Salama, Khaled

    MANAGEMENT INFORMATION SYSTEMS (MIS) CONCENTRATION FOR UNDERGRADUATES The management information systems concentration, like a major, focuses on the use of information technology for value creation creation. Link to Rensselaer 2012-2013 Catalog Required Courses MGMT 4240 Systems Analysis & Design MGMT

  13. Digital Publishing Procedures Category: Information Management

    E-Print Network [OSTI]

    (WA) Policy Manager Vice President Corporate Relations and Development Contact Director, Digital Media1 Digital Publishing Procedures Category: Information Management 1. LEGISLATION a framework for the publishing of the University's digital communications, including but not limited to all

  14. The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories

    Broader source: Energy.gov [DOE]

    The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories was presented to CRENEL 9/15/2014.

  15. The 5 Waves of Information Security From Kristian Beckman to the Present

    E-Print Network [OSTI]

    Boyer, Edmond

    The 5 Waves of Information Security 颅 From Kristian Beckman to the Present Prof SH (Basie) von to the present time. The paper makes use of two papers by the author, Information Security 颅 the Third Wave (von Solms, 2000) and Information Security 颅 the Fourth Wave (von Solms, 2006), as well as a paper

  16. Credit Leona Securities Asia CLSA UK | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentratingRenewable Solutions LLC Jump to:InformationCrandall, Texas:Credit Leona Securities

  17. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  18. Customizable application for personal information management

    E-Print Network [OSTI]

    Liu, Jamie, M. Eng. Massachusetts Institute of Technology

    2010-01-01T23:59:59.000Z

    As digital content becomes increasingly pervasive in our daily lives, next-generation organizational tools must be developed to help end users curate that information. The information management tools available today are ...

  19. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F.; Carroll, J.; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30T23:59:59.000Z

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  20. Secure quantum private information retrieval using phase-encoded queries

    SciTech Connect (OSTI)

    Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

    2011-08-15T23:59:59.000Z

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  1. An introduction Information and Records Management

    E-Print Network [OSTI]

    Hickman, Mark

    Bag 4800 Christchurch 8140 New Zealand www.canterbury.ac.nz Public RecordsAct ata glance 路 Only of the University. Public Records Act Information and Records Management at UC #12;Public RecordsAct2005 The Public Management team via records@canterbury.ac.nz. Archives New Zealand information on PRA, recordkeeping

  2. REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH

    E-Print Network [OSTI]

    REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE's information systems. The uniform approach to describing controls for both national security and nonnational, implement, and assess their security controls most effectively when the process is carried out as part

  3. UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY

    E-Print Network [OSTI]

    Adali, Tulay

    UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

  4. NIST Seeks Input for Planned 2011 Update of Security Control Catalog For Federal Information Systems and Organizations

    E-Print Network [OSTI]

    ; Supply chain security; Industrial/process control systems; and Privacy. NIST SP 80053, Revision 3 Publication 80053, Recommended Security Controls for Federal Information Systems and Organizations webbased access to the security controls for federal information systems and organizations

  5. Manager, Digital Developer Risk & Information Management Group

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    server 路 Deep understanding of the Web technology stack (TCP/IP, HTTP, HTML, XHTML, XML, JavaScript, CSS with at least one web programming languages such as Python, PHP, C/C++, C#, Ruby, or Java, especially on web, or other Web 2.0 solutions 路 Experience in machine learning, information retrieval, large-scale data mining

  6. Waste Management Information System (WMIS) User Guide

    SciTech Connect (OSTI)

    R. E. Broz

    2008-12-22T23:59:59.000Z

    This document provides the user of the Waste Management Information System (WMIS) instructions on how to use the WMIS software. WMIS allows users to initiate, track, and close waste packages. The modular design supports integration and utilization of data throuh the various stages of waste management. The phases of the waste management work process include generation, designation, packaging, container management, procurement, storage, treatment, transportation, and disposal.

  7. Information Technology Specialist (Data Management)

    Broader source: Energy.gov [DOE]

    (See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Corporate Services Office, Office of the Chief Information Officer, Enterprise...

  8. Algorithms and architecture for multiusers, multi-terminal, multi-layer information theoretic security

    E-Print Network [OSTI]

    Khisti, Ashish, 1979-

    2009-01-01T23:59:59.000Z

    As modern infrastructure systems become increasingly more complex, we are faced with many new challenges in the area of information security. In this thesis we examine some approaches to security based on ideas from ...

  9. Voluntary Disclosure and Information Asymmetry: Evidence from the 2005 Securities Offering Reform

    E-Print Network [OSTI]

    SHROFF, NEMIT

    In 2005, the Securities and Exchange Commission enacted the Securities Offering Reform (Reform), which relaxes 揼un-jumping restrictions, thereby allowing firms to more freely disclose information before equity offerings. ...

  10. Proceedings of the 7th World Conference on Information Security Education

    E-Print Network [OSTI]

    Bishop, Matt

    Proceedings of the 7th World Conference on Information Security Education 9-10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1-933510-94-3 漏 IFIP TC11.8 97 moment. Thus, the notion of security varies

  11. Security Requirements for Management Systems using Mobile Agents H. Reiser G. Vogt

    E-Print Network [OSTI]

    Security Requirements for Management Systems using Mobile Agents H. Reiser G. Vogt Munich Network Management Team Munich Network Management Team University of Munich, Germany Munich University of Technology and distributed management systems based on mobile agents have certain advantages over centralized and static

  12. Evergreen Securities formerly Ethanol Investments | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It isInformationexplains a4Evendale, Ohio: EnergySecurities formerly

  13. Security in Information Systems: New Challenges and Opportunities

    E-Print Network [OSTI]

    Jurjens, Jan

    systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment. This Special Issue of the international Journal of Universal Computer Science includes papers received from

  14. MBA Concentration in Analytics & Information Management A I M : Analytics & Information Management

    E-Print Network [OSTI]

    Lin, Xiaodong

    MBA Concentration Management Science and Information Systems Michael N. Katehakis, Chair Douglas Jones Sampling 16:540:580 Quality Management Take 3 courses from Area 2 and 1 course from Area 1. 5 / 9 #12;MBA Process Analysis Manager of Information System Analysis Health Care Revenue Cycle Consultant Investment

  15. Enriching personal information management with document interaction histories

    E-Print Network [OSTI]

    Whitton, Mary C.

    Enriching personal information management with document interaction histories by Karl Gyllstrom;Abstract KARL GYLLSTROM: Enriching personal information management with document interaction histories. (Under the direction of David Stotts.) Personal information management is increasingly challenging

  16. Office of Legacy Management. Information and Records Management. Transition Guidance

    SciTech Connect (OSTI)

    none,

    2004-03-01T23:59:59.000Z

    The Office of Legacy Management (LM) is an integral part of the U.S. Department of Energy抯 (DOE抯) strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. LM will work with each site using an integrated team approach to ensure a successful transition. Part of this process will include transition of Government records and information. The Office of Legacy Management Information and Records Management Transition Guidance focuses on LM抯 goal to preserve and protect legacy records and information. This guidance document establishes a framework for the transfer of records management responsibilities for sites transferring to LM. It describes the requirements, responsibilities, and procedures for the efficient and cost-effective transfer of custody, ownership, and management of records and other information products from the transfer site to LM. Records management practices are critical to the functions of Federal agencies because records provide information about, or evidence of, the organization, functions, policies, decisions, procedures, operations, or other activities. Therefore, the information generated by an agency is created, maintained, and dispositioned through records management processes that ensure the appropriate preservation and retrieval of essential information. Because of their intrinsic value, best practices to preserve information and records should be utilized when records are transferred from one organization to another. As the transfer program completes cleanup activities at closure sites, a transitional process will facilitate the transparent shift in the management of site records activities to LM. The roles and responsibilities of the transfer site and/or program and LM described in this document are a necessary foundation for cooperation and coordination and are essential to the successful transition of records and information responsibilities. The DOE Office of the Chief Information Officer (OCIO) has a central role in DOE records management by providing guidance, expertise, and coordination to all DOE offices and organizations and coordination with the National Archives and Records Administration (NARA). LM and the transfer site will complete an integrated transition plan which will integrate all transition elements including information and records. As part of the overall transition plan, an Information and Records Transition Plan will be developed consistent with the integrated transition plan for the site transfer and included as an attachment. The Information and Records Management Transition Plan will be developed to assist both organizations in organizing the tasks; establishing a timetable and milestones for their completion; and identifying manpower, funding and other resources that will be needed to complete the ownership transfer. In addition, the plan will provide a valuable exchange of institutional knowledge that will assist LM in meeting the obligations of responsibly managing legacy records. Guidance for the development of the plan is included in this document. Records management concerns that may arise during site closure, such as management support, contract language and agreements, interactions with the OCIO and NARA, resource and budget considerations, and procedures to safeguard records are addressed. Guidelines and criteria for records management transition activities are also provided. These include LM expectations for the inventory, scheduling, and disposition of records; the management and transfer of electronic files, including databases and software; records finding aids, indices, and recordkeeping systems; and the process for the transfer of hard copy and electronic records to LM.

  17. Information Flow Control for Secure Web Sites Maxwell Norman Krohn

    E-Print Network [OSTI]

    smaller, and configure the Web site's security policies. They need only change when the policy changes

  18. THE UNIVERSITY OF TEXAS AT DALLAS INFORMATION SECURITY

    E-Print Network [OSTI]

    O'Toole, Alice J.

    . Instead, these requirements should be integrated into a comprehensive system security plan. II. Scope

  19. Information-Theoretically Secure Communication Under Channel Uncertainty

    E-Print Network [OSTI]

    Ly, Hung Dinh

    2012-07-16T23:59:59.000Z

    . In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We...

  20. Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

  1. CONTRACTOR ASBESTOS INFORMATION ASBESTOS MANAGEMENT AT SFU

    E-Print Network [OSTI]

    CONTRACTOR ASBESTOS INFORMATION ASBESTOS MANAGEMENT AT SFU An extensive Asbestos Survey has been term Asbestos Management Program was approved by the Workers' Compensation Board of British Columbia. Note: There is a possibility that ACM containing materials may not have been identified or labeled

  2. LM Records and Information Management Transition Guidance (January...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Records and Information Management Transition Guidance (January 2015) LM Records and Information Management Transition Guidance (January 2015) This guidance document establishes a...

  3. U-168: EMC Documentum Information Rights Management Server Bugs...

    Broader source: Energy.gov (indexed) [DOE]

    8: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote...

  4. Guidance for FY2014 Facilities Information Management System...

    Office of Environmental Management (EM)

    Guidance for FY2014 Facilities Information Management System Data Validations Guidance for FY2014 Facilities Information Management System Data Validations FY 2014 FIMS Data...

  5. Energy Management and Information Systems Study - 2014 BTO Peer...

    Energy Savers [EERE]

    Management and Information Systems Study - 2014 BTO Peer Review Energy Management and Information Systems Study - 2014 BTO Peer Review Presenter: Jessica Granderson, Lawrence...

  6. RT-Based Administrative Models for Community Cyber Security Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan Institute for Cyber Security & Department of Computer Science Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas at San

  7. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-13T23:59:59.000Z

    The purpose of this directive is to ensure that STI is appropriately managed as part of the DOE mission to enable the advancement of scientific knowledge and technological innovation. Cancels DOE O 241.1A and DOE O 241.1A Chg 1.

  8. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-08-15T23:59:59.000Z

    The Guide provides a methodology for implementing the safeguards and security requirements of DOE O 413.3B. Cancels DOE G 413.3-3.

  9. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    SciTech Connect (OSTI)

    Madden, Michael S.

    2010-05-01T23:59:59.000Z

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  10. Cyber safety : a systems thinking and systems theory approach to managing cyber security risks

    E-Print Network [OSTI]

    Salim, Hamid M

    2014-01-01T23:59:59.000Z

    If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet ...

  11. CargoNet : micropower sensate tags for supply-chain management and security

    E-Print Network [OSTI]

    Malinowski, Mateusz Ksawery

    2007-01-01T23:59:59.000Z

    This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state ...

  12. Efficient Private Information Retrieval Using Secure Xiangyao Yu, Christopher W. Fletcher

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    attention from the cryptography and security communities. Two main approaches to solve PIR have appearedEfficient Private Information Retrieval Using Secure Hardware Xiangyao Yu, Christopher W. Fletcher, marten, devadas}@mit.edu ABSTRACT Existing crypto-based Private Information Retrieval (PIR) schemes

  13. UNIVERSITY OF PITTSBURGH AT GREENSBURG Management -Information Systems

    E-Print Network [OSTI]

    Sibille, Etienne

    UNIVERSITY OF PITTSBURGH AT GREENSBURG Management - Information Systems u n d e r g r a d u a t e p r o g r a m Management - Information Systems 48 credits Bachelor of Science Management - Information Accounting MGMT 1818 Management Science INFSCI 0010 Introduction to Information Systems and Society Area

  14. Recommendation 171: Commendation for Waste Information Management System

    Broader source: Energy.gov [DOE]

    The ORSSAB commends DOE and Florida International University for development of the Waste Information Management System.

  15. PKI-based security for peer-to-peer information sharing

    SciTech Connect (OSTI)

    Berket, Karlo; Essiari, Abdelilah; Muratas, Artur

    2004-05-02T23:59:59.000Z

    The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.

  16. Security Analysis and Project Management Systems | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security andSecurity

  17. Research With Students My principal research activities lie in information systems security with particular emphasis on access control

    E-Print Network [OSTI]

    of security, and secure transaction processing. My recent research has expanded beyond information systemsResearch With Students My principal research activities lie in information systems security and mining, semantic web and multimedia delivery. 1 Major Results Security solutions for workflow systems

  18. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-09T23:59:59.000Z

    To establish Department of Energy (DOE) requirements and responsibilities to ensure that scientific and technical information (STI) is identified, processed, disseminated, and preserved in a manner that (a) enables the scientific community and the public to locate and use the unclassified and unlimited STI resulting from DOE's research and related endeavors and (b) ensures access to classified and sensitive unclassified STI is protected according to legal or Departmental requirements. Cancels DOE O 241.1. Canceled by DOE O 241.1A Chg 1.

  19. Vencon Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformation UCOpen EnergyVelankani Group Jump to: navigation, Place: United

  20. Managerial information behaviour: Relationships among Total Quality Management orientation, information use environments, and managerial roles

    E-Print Network [OSTI]

    Simard, C; Rice, Ronald E

    2006-01-01T23:59:59.000Z

    NetWorking Total quality management and the control of workall information reported to management Quality means meetingby integrating total quality management and socio-technical

  1. Toward A Secure and Usable Cloud-based Password Manager for Web Browsers

    E-Print Network [OSTI]

    Yue, Chuan

    on different websites. Password manager, particularly Browser-based Password Manager (BPM), is one of the most, we propose a novel Cloud-based Storage-Free BPM (CSF-BPM) design to achieve a high level of security with the desired confidentiality, integrity, and availability properties. We have implemented a CSF-BPM system

  2. PARS II New Contractor Information for Interconnection Security...

    Office of Environmental Management (EM)

    V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

  3. An interactive spatial information management system on the internet: the fire ant spatial information management system

    E-Print Network [OSTI]

    Dudek, Timothy Kirk

    2000-01-01T23:59:59.000Z

    to that information. The primary purpose of any information management system is to provide users with information that is complete, accurate, and in real-time (Obermeyer and Pinto 1994). The Internet has the capability to do just that with spatial data...

  4. Automated Information Management via Abductive Logic Agents

    E-Print Network [OSTI]

    Toni, Francesca

    Automated Information Management via Abductive Logic Agents F.Toni 1 Imperial College of Science representation of networks and meta-data via abductive logic programs and make use of the reasoning engine abductive logic pro- grams are equipped with for checking as well as enforcing the properties represented

  5. Safeguards and Security for Program and Project Management - DOE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and Security Systems SHARE

  6. Final Report Implementing Office of Management and Budget Information...

    Broader source: Energy.gov (indexed) [DOE]

    Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (67 Fed Reg 62446) Final Report Implementing Office of Management and Budget...

  7. Portland State University Confidentiality and Information Management Policy and Procedures

    E-Print Network [OSTI]

    Bertini, Robert L.

    Portland State University Confidentiality and Information Management Policy and Procedures I:\\Staff\\DEV\\Office\\KATRINA\\WEB\\Policies Page\\Info Mgmt Policy & Procedures.doc 8/15/2008 PORTLAND STATE UNIVERSITY CONFIDENTIALITY and INFORMATION MANAGEMENT POLICY and PROCEDURES Confidentiality and Information Management Policy Information

  8. ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS

    E-Print Network [OSTI]

    Habib, Ayman

    ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

  9. Proceedings of the 7 th World Conference on Information Security Education 910 June 2011, Lucerne, Switzerland

    E-Print Network [OSTI]

    Bishop, Matt

    Proceedings of the 7 th World Conference on Information Security Education 9颅10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1颅933510颅94颅3 漏 IFIP TC11.8 97 moment. Thus, the notion of security varies

  10. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard

    E-Print Network [OSTI]

    Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard Stefan Fenz an ontology-based framework to improve the preparation of ISO/IEC 27001 audits, and to strengthen the security elaborate on how ISO/IEC 27001 artifacts can be inte- grated into this ontology. A basic introduction

  11. Model-driven Security Policy Deployment: Property Oriented Approach

    E-Print Network [OSTI]

    Garcia-Alfaro, Joaquin

    and managing the access control rules of an information system are some of the major concerns of security systems. We formally prove the process of de- ploying a security policy related to an information system the deployment of access control security policies. We show how the use of a formal ex- pression of the security

  12. GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor

    E-Print Network [OSTI]

    , was written by Karen Scarfone and Murugiah Souppaya of NIST, and by Amanda Cody and Angela Orebaugh of Booz Allen Hamilton. The new guide replaces NIST SP 800-42, Guideline on Network Security Testing. NIST SP

  13. HQ Emergency Management Team (EMT) | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    protective actions) The EMT provides briefings andor reports to NNSA and Department of Energy senior management, coordinatesprovides support to field response operations, and...

  14. Inspection of Emergency Management at the Office of Secure Transportat...

    Broader source: Energy.gov (indexed) [DOE]

    with the identifi ed hazards. The emergency plan defi nes and conveys the management philosophy, organizational structure, administrative controls, decision-making...

  15. NNSA selects Consolidated Nuclear Security, LLC to manage the consolidated

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministrationImprovement |contract

  16. An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions

    E-Print Network [OSTI]

    Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

    2006-01-01T23:59:59.000Z

    This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the ...

  17. Information needs for risk management/communication

    SciTech Connect (OSTI)

    Bennett, D.A. [Environmental Protection Agency, Washington, DC (United States)

    1990-12-31T23:59:59.000Z

    The hazardous waste cleanup program under the Comprehensive Environmental Response, Compensation, and Liability Act (Superfund) is delegated to the ten Regions of the US Environmental Protection Agency (EPA) and has, to date, identified more than 33,000 sites for consideration. The size and complexity of the program places great demands on those who would provide information to achieve national consistency in application of risk assessment while meeting site-specific needs for risk management and risk communication.

  18. 29.01.03.M1.16 Information Resources-Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    information resources. This includes, but is not limited to: laptops, Personal Digital Assistants (PDAs29.01.03.M1.16 Information Resources- Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.16 Information Resources 颅 Portable Devices: Information Security Approved

  19. ORAU: National Security and Emergency Management Fact Sheet

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControlsOMB Policies OR I GI N A L S

  20. ORISE National Security and Emergency Management: Contact Us

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControlsOMB Policies OR I GI NHow toContact

  1. Law Enforcement & Emergency Management Liaison | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational NuclearhasAdministration77NuclearSecurity

  2. NNSA Field Office Manager Moves | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclear SecurityNationalApplyMaintaining ForNProgram | NationalEstablished

  3. Panel on protection and management of plutonium: Subpanel on safeguards and security

    SciTech Connect (OSTI)

    Tape, J.W.

    1995-07-01T23:59:59.000Z

    Nuclear materials safeguards and security systems are described in the context of the nuclear nonproliferation regime. Materials of interest to safeguards, threats, proposals to strengthen International Atomic Energy Agency safeguards, evolving safeguards issues and requirements, system effectiveness, and elements of a global nuclear materials management regime are discussed. Safeguards are seen as an essential element of nuclear materials management, but not a driver for decisions regarding nuclear power or the disposal of excess weapon nuclear materials.

  4. Delegating Network Security with More Information Stanford University

    E-Print Network [OSTI]

    's networks. Delegation makes administrators less of a bottle- neck when policy needs to be modified and allows network administration to follow organizational lines. To enable del- egation, we propose ident authority, the network administrator, that administrator has usually had to configure myriad security

  5. INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu

    E-Print Network [OSTI]

    Shyy, Wei

    what might be lurking there ready to attack. According to the SANS (SysAdmin, Audit, Network, Security the Internet with an administrator's account, your computer is at an even higher risk since most malicious code is designed to infiltrate your computer by using the total access of the administrator's account against you

  6. CMAD IV 11/14/96 Information Security

    E-Print Network [OSTI]

    California at Davis, University of

    utilities, power pools, vendors etc.. #12;CMAD IV 11/14/96 #12; #12; GridCo LineCo PoolCo Energy Merchant INFO INFO INFO $ $ $ PWR PWR PWR #12;CMAD IV 11/14/96 "Future" Is At Hand 路 Federal Energy Regulatory protection and audit practices inadequate. 路 Internal priorities limiting attention to security concerns

  7. Secure Business Process Management: A Roadmap Thomas Neubauer, Markus Klemen, Stefan Biffl

    E-Print Network [OSTI]

    process life cycle. I. INTRODUCTION In many domains companies model and optimize their busi- ness process management (BPM) aims at efficiently creating business value there is a number of threats are continously increasing their resources to protect their business processes against security threats. Companies

  8. Building boundary is necessary for the real estate industry, flood management, and homeland security applications.

    E-Print Network [OSTI]

    Shan, Jie

    Abstract Building boundary is necessary for the real estate industry, flood management, and homeland security applications. The extraction of building boundary is also a crucial and difficult step, and Purdue University campus are evaluated. Introduction Airborne lidar (light detection and ranging

  9. Waste Management Facilities Cost Information Report

    SciTech Connect (OSTI)

    Feizollahi, F.; Shropshire, D.

    1992-10-01T23:59:59.000Z

    The Waste Management Facility Cost Information (WMFCI) Report, commissioned by the US Department of Energy (DOE), develops planning life-cycle cost (PLCC) estimates for treatment, storage, and disposal facilities. This report contains PLCC estimates versus capacity for 26 different facility cost modules. A procedure to guide DOE and its contractor personnel in the use of estimating data is also provided. Estimates in the report apply to five distinctive waste streams: low-level waste, low-level mixed waste, alpha contaminated low-level waste, alpha contaminated low-level mixed waste, and transuranic waste. The report addresses five different treatment types: incineration, metal/melting and recovery, shredder/compaction, solidification, and vitrification. Data in this report allows the user to develop PLCC estimates for various waste management options.

  10. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    SciTech Connect (OSTI)

    Barbara McCabe; John Kovach

    2009-03-30T23:59:59.000Z

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  11. 29.01.03.M1.26 Information Resources Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.26 Information Resources 颅 Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.26 Information Resources 颅 Information Security Risk Assessment Reviews security risk assessments are vital procedures for maintaining the security of information resources

  12. Solar International Management Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty Ltd Jump to:Information Silver Peak AreaOutline JumpHold JumpManagement Inc

  13. National Interest Security Company NISC Formerly Technology Management

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte3InformationofServices TMS Inc | Open Energy Information

  14. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  15. On the Computational Practicality of Private Information Retrieval Network Security and Applied Cryptography Lab

    E-Print Network [OSTI]

    Carbunar, Bogdan

    On the Computational Practicality of Private Information Retrieval Radu Sion Network Security of single-server computational pri- vate information retrieval (PIR) for the purpose of preserv- ing client access patterns leakage. We show that deployment of non-trivial single server PIR protocols on real

  16. Mobile Technology Management - DOE Directives, Delegations, and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    203.2, Mobile Technology Management by Denise Hill Functional areas: Mobile Technology, Information Technology, Information Security The order establishes requirements, assigns...

  17. What can I do with a degree in Telecommunications and Information Management (TIM)

    E-Print Network [OSTI]

    de Doncker, Elise

    Communications Manager Production Line Manager Management Consulting Materials Controller Market Research AnalystWhat can I do with a degree in Telecommunications and Information Management (TIM) Telecommunications and Information Management involves the integration of business information systems

  18. Information Security: The Human Perspective Kathleen M. Carley

    E-Print Network [OSTI]

    Sadeh, Norman M.

    , redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing resource records, and organizational accounting information. Recent cases of industrial espionage all point addressed if both technological and organizational issues are considered simultaneously. How should

  19. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01T23:59:59.000Z

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  20. The Value of Information in Inventory Management

    E-Print Network [OSTI]

    2007-05-24T23:59:59.000Z

    Inventory management traditionally assumes the precise knowledge of the ... stage inventory management in a robust optimization framework; the precise...

  1. Technology & Information Management Minor Curriculum Chart: 2013-2014

    E-Print Network [OSTI]

    Stuart, Josh

    Technology & Information Management Minor Curriculum Chart: 2013-2014 http 11B or 19B TIM 105 Management of Technology I ISM 50 or perm. of instructor Entry Level Writing Requirement TIM 158 Business Strategy & Information Systems ISM 105 TIM 125 Management of Technology II

  2. Interactive Volumetric Information Visualization for Document Corpus Management

    E-Print Network [OSTI]

    Miller, Ethan L.

    Interactive Volumetric Information Visualization for Document Corpus Management David S Ebert U must be extracted. By contrast, information analysis or document corpus management seeks to understand system that aids in the document corpus management task by em- ploying 3D volumetric visualization

  3. EcoSecurities Brasil Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It is classified asThisEcoGrid EU (Smart Grid Project) JumpEcoSecurities

  4. TEPS/BPA Information | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign Object DamageSystemsU.S. TALKS1 | E nergyTEPS/BPA

  5. NMMSS Information, Reports & Forms | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclear SecurityNationalApplyMaintaining ForN x NSecurity| National

  6. Emergency Public Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for37 East and West Other SLAC ResourcesSecurity /

  7. Recommended Security Controls for Federal Information Systems and Organizations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST 800-53 Revision 3 + Draft Revision 4 Recommended

  8. Moving Objects Information Management: The Database (Vision Paper)

    E-Print Network [OSTI]

    Wolfson, Ouri E.

    transportation and air traffic control, weather forecasting, emergency response, mobile resource management, and mobile workforce. Location management, i.e. the management of transient location information, is an enabling technology for all these applications. Location management is also a fundamental component

  9. Information flow in the DAMA Project beyond database managers: Information flow managers

    SciTech Connect (OSTI)

    Russell, L. [Argonne National Lab., IL (United States); Wolfson, O.; Yu, C. [Illinois Univ., Chicago, IL (United States)

    1996-03-01T23:59:59.000Z

    To meet the demands of commercial data traffic on the information highway, a new look at managing data is necessary. One projected activity, sharing of point-of-sale information, is being considered in the Demand Activated Manufacturing Project of the American Textile Partnership project. A scenario is examined in which 100,000 retail outlets communicate over a period of days. They provide the latest estimate of demand for sewn products across a chain of 26,000 suppliers through the use of bill-of-materials explosions at four levels of detail. A new paradign the information flow manager, is developed to handle this situation, including the case where members of the supply chain fail to communicate and go out of business. Techniques for approximation are introduced to keep estimates of demand as current as possible.

  10. Service oriented architecture governance tools within information security .

    E-Print Network [OSTI]

    Mokgosi, Letlhogonolo

    2012-01-01T23:59:59.000Z

    ??Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for (more)

  11. Green Bulletin Information for pest management professionals and pesticide applicators

    E-Print Network [OSTI]

    Ishida, Yuko

    Vol. 3 l No. 3 l May 2013 Green Bulletin Information for pest management professionals subscription to the Green Bulletin at http://www.ipm.ucdavis.edu/greenbulletin! What Can Landscape Managers Do

  12. Wild deer management An issues paper to inform the

    E-Print Network [OSTI]

    Wild deer management in Wales An issues paper to inform the preparation of a management strategy and action plan for wild deer in Wales #12;Contents Introduction and explanatory note.................................................... 3 1. Background: wild deer in Wales.................................................... 5 2. Current

  13. Contract Administration & Business Management | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User GroupInformationE-Gov Contacts forScience (SC) Continuity

  14. Information System Security Manager (ISSM) | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietipDepartment ofTheDepartmentEnergy Industry

  15. EEO Complaints Information for Managers | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct:DirectivesSAND2015-2127 O Dr.andAnnual Training |

  16. V-192: Symantec Security Information Manager Input Validation Flaws Permit

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacksService

  17. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    devices have been used by cyber- criminals to launch attacks both within and outside universities information resources and to take action to mitigate that threat. Action that is taken will be based resource has been launched; 4) confidential, private, or proprietary electronic information

  18. Private Information Retrieval, Optimal for Users and Secure Coprocessors

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    @dbis.informatik.hu颅berlin.de Abstract. A private information retrieval (PIR) protocol allows a user to retrieve one of N records from a database while hiding the identity of the record from the database server. A PIR protocol is optimal Private Information Retrieval (PIR) protocols. Formally, a PIR protocol allows a user to retrieve one of N

  19. An Information Security Education Initiative for Engineering and Computer Science

    E-Print Network [OSTI]

    and electronic commerce. These applications rely on a collection of switching systems, databases, network Science Board Task Force on Information Warfare { Defense (IW-D) 7]: The reality is that the vulnerability of the Department of Defense { and of the nation { to o ensive information warfare attack is largely a self

  20. Knowledge information management toolkit and method

    DOE Patents [OSTI]

    Hempstead, Antoinette R.; Brown, Kenneth L.

    2006-08-15T23:59:59.000Z

    A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

  1. Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables

    SciTech Connect (OSTI)

    Not Listed

    2011-09-01T23:59:59.000Z

    Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

  2. Modified Letter from Tom Formanek, Manager, Ithaca Social Security Administration September 2011

    E-Print Network [OSTI]

    Hemami, Sheila S.

    for a Social Security number, becoming insured under Social Security, planning for retirement, and filing

  3. Promoting safety, security, and sustainability: Institute fosters programs on natural resource science and management

    E-Print Network [OSTI]

    Wythe, Kathy

    2011-01-01T23:59:59.000Z

    science and management, the Texas A&M Institute of Renewable Natural Resources (IRNR) protects and promotes the safety, security, and sustainability of land, water, and wildlife. IRNR, a unit of Texas AgriLife Research and the Texas Agri... projects that promote sustainable land use through stewardship practices, land-use forecasting and policy, restoration ecology, and ecosystem services. Involved in working on landscape-scale restoration projects, IRNR developed the Trinity River...

  4. The Value of Information in Inventory Management

    E-Print Network [OSTI]

    Gokhan Metan

    2007-05-25T23:59:59.000Z

    May 25, 2007 ... Abstract: Inventory management traditionally assumes the precise knowledge of the underlying demand distribution and a risk-neutral manager...

  5. Best Management Practice #2: Information and Education Programs...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Best Management Practice 2: Information and Education Programs Educating users about water conservation is essential to sustain the savings of water-efficient technologies and...

  6. Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  7. Lemnos interoperable security project.

    SciTech Connect (OSTI)

    Halbgewachs, Ronald D.

    2010-03-01T23:59:59.000Z

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  8. 2014 Construction Management Program Information The UNLV Construction Management program is accredited by the American Council for

    E-Print Network [OSTI]

    Walker, Lawrence R.

    2014 Construction Management Program Information The UNLV Construction Management program is accredited by the American Council for Construction Education (ACCE). Our most recent accreditation visit this information for the UNLV Construction Management program. If you have questions about the information

  9. ISS-005, Laptop Encryption Standard 1/2 UCIT INFORMATION SECURITY STANDARDS

    E-Print Network [OSTI]

    Habib, Ayman

    ISS-005, Laptop Encryption Standard 1/2 UCIT INFORMATION SECURITY STANDARDS Laptop Encryption Standard Definitions 1 1.1 Encryption: The process used to protect the confidentiality and integrity contained within it is appropriately encrypted. Applicability 3 This standard applies to all UofC owned

  10. University of London International Academy MSc/PG Dip in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    from the criminal angle and presenting a study of computer crime and the computer criminal. We criminals. Pre-requisites None Essential Reading Cybercrime: The transformation of crime in the Information should be able to: follow trends in computer crime relate computer security methodologies to criminal

  11. Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy

    E-Print Network [OSTI]

    Maurer, Ueli

    Lucas Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT controls Supported by the Zurich Information Security Center. Work done while at ETH Zurich, Switzerland

  12. HybridSecure MPC: Trading InformationTheoretic Robustness for Computational Privacy

    E-Print Network [OSTI]

    Maurer, Ueli

    Lucas # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT--- Cryptographic controls # Supported by the Zurich Information Security Center. + Work done while at ETH Zurich

  13. Division of Information Information Systems Documentation Enterprise Systems Management Framework Version 6.0

    E-Print Network [OSTI]

    Botea, Adi

    Division of Information Information Systems Documentation Enterprise Systems Management Framework Version 6.0 Enterprise Systems Management Framework Version: 6.0 Date: 2 Jan 2008 Status: Endorsed Systems Management Framework Version 6.0 DOCUMENT DETAILS Document Number CIS 0002/200504466 Document

  14. A Knowledge-Engine Architecture for a Competence Management Information

    E-Print Network [OSTI]

    Kimble, Chris

    focus of our work is to support the management of employees' competencies through using a KM approach focus of our work is to support the management of employees' competencies through using a KM approachA Knowledge-Engine Architecture for a Competence Management Information System Jos茅 Braga de

  15. A management information system model for convenience stores

    E-Print Network [OSTI]

    Moede, Eric Arne

    1978-01-01T23:59:59.000Z

    of infomna- tion that convenience store managers can use to accomplisll coimoany objecti v s . This model will serv as a guide with which convenience store companies can set up thei r own management information systems . ~si. Obj eii es 1) Identify...', and 6) the organizational impact of a manage- ment information system. E~i i 1 R h i ll g I I 0 ~tip. 5 -. +s The majority of research on management information systems has been theoretically oriented. Little empirical research has been achieved...

  16. Carnegie Mellon University 70-451 Management Information Systems: Spring 2012Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon Univ

    E-Print Network [OSTI]

    Gatterbauer, Wolfgang

    Carnegie Mellon University 70-451 Management Information Systems: Spring 2012Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring

  17. MN Office of Energy Security | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpIncMAKGalway Bay IEOWCCatcher.pngWavemill <MN Office of Energy

  18. Security-Widefield, Colorado: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty Ltd Jump to: navigation, search Name: Seadov PtySeboeis,Information

  19. Guide to the Management of Scientific and Technical Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-11-23T23:59:59.000Z

    This Guide to the management of scientific and technical information (STI) provides nonmandatory guidelines for implementing the objective, requirements, and responsibilities of Department of Energy (DOE) O 241.1A, Scientific and Technical Information Management. Cancels DOE G 241.1-1. Canceled by DOE N 251.83. Best practices, instructions, and additional information are now accessible at www.osti.gov/stip.

  20. Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

  1. The theory of diversity and redundancy in information system security : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Pierson, Lyndon George

    2010-10-01T23:59:59.000Z

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  2. Supply chain management (SCM) involves the management of materials and information across the entire supply chain. This includes raw material

    E-Print Network [OSTI]

    Calgary, University of

    Supply chain management (SCM) involves the management of materials and information across this concentration will be required to take three core courses: Materials and Supply Chain Management, Transportation Purchasing identify global sources of materials, select vendors, and manage negotiati

  3. An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may partner with the

    E-Print Network [OSTI]

    .S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA scaling

  4. Office of Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  5. Energy Department Seeks Information on Geothermal Risk and Uncertainty Management

    Broader source: Energy.gov [DOE]

    The Energy Department's Office of Energy Efficiency and Renewable Energy (EERE) has issued a Request for Information (RFI) to help quantify and manage risk in geothermal exploration, in an effort...

  6. 15.568A Management Information Systems, Spring 2003

    E-Print Network [OSTI]

    Gibson, Cyrus F.

    The course purpose is to provide the substance and skill necessary to make sound business decisions relating to information systems, and to work with senior line managers in the resolution of issues and problems in this ...

  7. Managing Information Flow between SysML and Modelica

    E-Print Network [OSTI]

    Managing Information Flow between SysML and Modelica A Model-Based Design Project for ME6101ML and Modelica languages. Once I apply the method, I discuss the utility, limitations, and necessary future work

  8. Audit Report on "The Office of Science's Management of Information Technology Resources"

    SciTech Connect (OSTI)

    None

    2009-11-01T23:59:59.000Z

    The Department of Energy's Office of Science (Science) and its facility contractors are aggressive users of information technology (IT) to support fundamental research in areas such as energy, environmental remediation and computational sciences. Of its $4 billion Fiscal Year 2008 budget, Science spent about $287 million to manage its IT program. This included cyber security activities, acquisition of hardware and software, and support service costs used to maintain the operating environments necessary to support the missions of the program. Prior Office of Inspector General reports have identified various issues with Science's management of its IT programs and resources. For instance, our report on Facility Contractor Acquisition and Management of Information Technology Hardware (DOE/IG-0768, June 2007) noted that the Science sites reviewed spent more than necessary when acquiring IT hardware. In another example, our review of The Department's Efforts to Implement Common Information Technology Services at Headquarters (DOE/IG-0763, March 2007) disclosed that Science's reluctance to adopt the Department of Energy Common Operating Environment (DOE-COE) at Headquarters contributed to the Department's inability to fully realize potential cost savings through consolidation and economies of scale. In light of the magnitude of the Office of Science IT program and previously identified program weaknesses, we initiated this audit to determine whether Science adequately managed its IT resources. Science had taken a number of actions to improve its cyber security posture and align its program to Federal requirements. Yet, our review disclosed that it had not taken some basic steps to enhance security and reduce costs. In particular, we found that: (1) For their non-scientific computing environments, all seven of the field sites reviewed (two Federal, five contractor) had implemented security configurations that were less stringent than those included in the Federal Desktop Core Configuration. This configuration was designed by the National Institute of Standards and Technology and its use was mandated by the Office of Management and Budget; (2) Although we previously highlighted weaknesses and recommended corrective actions, Science still had not fully established or enforced IT hardware standards for acquiring hardware such as desktop and laptop computers or related peripherals, contributing to significant unnecessary expenditures; and (3) While we have noted in a series of past reports that significant savings could be realized from aggregating demand for IT services and products across the enterprise, Science had not implemented a common infrastructure for users at its Federal sites and continued to maintain an IT environment independent of the Department's Common IT Operating Environment. The weaknesses identified were attributable, at least in part, to a lack of adequate policies and procedures for ensuring effective cyber security and hardware acquisition practices. In addition, Science had not effectively monitored the performance of its field sites to ensure that previously reported internal control weaknesses were addressed and had not implemented an appropriate mechanism to track its IT-related costs. Without improvements, Science may be unable to realize the benefits of improved security over its information systems, reduce costs associated with hardware acquisition, and lower IT support costs through consolidation of services. In particular, we determined that Science could potentially realize savings of more than $3.3 million over the next three years by better controlling hardware costs and implementing standards for certain equipment. Furthermore, Science could continue to pay for duplicative IT support services and fail to take advantage of opportunities to lower costs and apply potential savings to mission-related work. During the course of our audit work, we learned from Science officials that they had initiated the process of revising the Program Cyber Security Plan to better clarify its policy for implementing

  9. The Information System The ideal system manager has the curiosity of a cat,

    E-Print Network [OSTI]

    Chapter 2 The Information System Manager #12;The ideal system manager has the curiosity of a cat manage? As a property level information system manager, you may manage the following 3 types of computer #12;Who should manage the information system? O Patience and good communication skills O Hands

  10. Information Management in the Smart Grid: A Learning Game Approach

    E-Print Network [OSTI]

    Paris-Sud XI, Universit茅 de

    Information Management in the Smart Grid: A Learning Game Approach H茅l猫ne Le Cadre MINES Paris In this article, the smart grid is modeled as a decentralized and hierarchical network, made of three categories the deployment of smart Information and Communication Technolo- gies (ICTs), to supervise the grid operation [5

  11. Student Brand Manager and Related Vacancies Student Information

    E-Print Network [OSTI]

    Stevenson, Mark

    The Careers Service. Student Brand Manager and Related Vacancies Student Information Context and vacancy service to current students and recent graduates of the University. While recognising it also students and graduates. Students and graduates can expect to access a range of vacancy information

  12. The Value of Information in Inventory Management

    E-Print Network [OSTI]

    2008-04-08T23:59:59.000Z

    demand is not available, but the decision-maker receives advance information on the success. (high, low or ... of the market response at such an early stage of the product lifecycle. ...... Technical report, Massachusetts Institute of Technology,.

  13. Commercial Algae Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergyCTBarreisVolcanicPowerRaftColumbia RuralCommercial Algae Management

  14. Community Management Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergyCTBarreisVolcanicPowerRaftColumbiaCommercialEconomicManagement

  15. Determining information management needs for enhanced international safeguards

    SciTech Connect (OSTI)

    Badalamente, R.V. [Pacific Northwest Lab., Richland, WA (United States); DeLand, S.M. [Sandia National Labs., Albuquerque, NM (United States); Whiteson, R. [Los Alamos National Lab., NM (United States); Anzelon, G. [Lawrence Livermore National Lab., CA (United States)

    1994-08-01T23:59:59.000Z

    The Safeguards Information Management System initiative is a program of the Department of Energy`s (DOE) Office of Arms Control and Nonproliferation aimed at supporting the International Atomic Energy Agency`s (IAEA) efforts to strengthen safeguards through the enhancement of information management capabilities. The DOE hopes to provide the IAEA with the ability to correlate and analyze data from existing and new sources of information, including publicly available information, information on imports and exports, design information, environmental monitoring data, and non-safeguards information. The first step in this effort is to identify and define IAEA requirements. In support of this, we have created a users` requirements document based on interviews with IAEA staff that describes the information management needs of the end user projected by the IAEA, including needs for storage, retrieval, analysis, communication, and visualization of data. Also included are characteristics of the end user and attributes of the current environment. This paper describes our efforts to obtain the required information. We discuss how to accurately represent user needs and involve users for an international organization with a multi-cultural user population. We describe our approach, our experience in setting up and conducting the interviews and brainstorming sessions, and a brief discussion of what we learned.

  16. Environmental Resources Management ERM | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It isInformation ContractsCGNPC JVEnvergyInformationERM Jump to:

  17. Federal Emergency Management Information system (FEMIS) data management guide. Version 1.2

    SciTech Connect (OSTI)

    Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Johnson, S.M.; Loveall, R.M.; Winters, C.

    1996-05-01T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the data files and database that support the administrative, user-environment, database management, and operational capabilities of FEMIS. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, how it is loaded, and how it is managed while the system is in operation.

  18. UNIVERSITY OF CENTRAL FLORIDA 348 Undergraduate Catalog 2014-2015 Health Informatics and Information Management -

    E-Print Network [OSTI]

    Wu, Shin-Tson

    hrs) HIM 3006 Foundations of Health Information Management (HIM) 3 hrs HIM 4508C Quality Management 3 hrs HIM 4656C Health Information Management Systems 3 hrs HSC 3537 Medical Terminology 3 hrs HIM 4226C and Information Management - Minor College of Health and Public Affairs Department of Health Management

  19. Evidential Grids Information Management in Dynamic Environments

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    of Compi鑗ne CNRS Heudiasyc UMR 7253, France Email: surname.name@utc.fr Abstract--An occupancy grid map conditions. The perception strategy involves map and scan grids [9], [10]. Indeed, an instantaneous scan grid-detections. The map grid acts as a filter that accumulate information and allows to detect moving objects. In dynamic

  20. Position Management and Classification (Informational Purposes Only)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-01-26T23:59:59.000Z

    This draft has been scheduled for final review before the Directives Review Board on 02/5/2015. All major comments and concerns should be provided to your DRB representative by 02/3/2015, following your organization process. If you do not know who your representative is, please see the list of DRB members. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-1014).

  1. Acquisition Career Management Program (Informational Purposes Only)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-11-21T23:59:59.000Z

    This draft has been scheduled for final review before the Directives Review Board on 12-4-2014. All major comments and concerns should be provided to your DRB representative, following your organization process. If you do not know who your representative is, please see the list of DRB members at https://www.directives.doe.gov/beta/references/directives-review-board. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-4014). All major comments and concerns should be submitted by COB 12-2-2014.

  2. Wista Management GMBH | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:SeadovCooperative JumpWilliamson County,Bay,掳 LoadingWiseEnergy Jump to:Wista Management

  3. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    SciTech Connect (OSTI)

    Farnham, Irene; Marutzky, Sam

    2014-12-01T23:59:59.000Z

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan抯 purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs梩he Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)梐nd their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  4. Information Collection Management | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehicles 禄Exchange Visitors HistoryHybrid WindInformation Collection

  5. Applied Energy Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300AlgoilEnergy Information the Army Permit:

  6. Akeida Capital Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergy Information LightningAikenAkan, Wisconsin: EnergyAkeida

  7. Calpine Power Management LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160Benin: EnergyBoston Areais3:Information USCalloway County,

  8. Broad knowledge of information technologies: a prerequisite for the effective management of the integrated information system

    SciTech Connect (OSTI)

    Landau, H.B.

    1980-09-01T23:59:59.000Z

    There is a trend towards the bringing together of various information technologies into integrated information systems. The managers of these total systems therefore must be familiar with each of the component technologies and how they may be combined into a total information system. To accomplish this, the effective manager should first define the overall system as an integrated flow of information with each step identified; then, the alternate technologies applicable to each step may be selected. Methods of becoming technologically aware are suggested and examples of integrated systems are discussed.

  9. 15.568B Management Information Systems: Generating Business Value from Information Technology, Spring 2003

    E-Print Network [OSTI]

    Weill, Peter

    Concepts, frameworks, tools, techniques, and processes that assist management in its interaction with and direction of computer-based information systems today. Discusses the impact of the Internet, changes in the IT ...

  10. Vencon Management, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformation UCOpen EnergyVelankani Group Jump to: navigation, Place:

  11. Oregon Coastal Management Program | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth'sOklahoma/GeothermalOrange County is a county in Florida. Its FIPSManagement

  12. Guinness Asset Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:Photon Place:Net Jump Agency/Company(Redirected from

  13. Century Asset Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160Benin:Energy Information on PV2009 | Open EnergyHall,as RenovablesCentrothermAsset

  14. UPC Solar Managment LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformation UC 19-6-401 et seq. - UtahAsia Climate Change NetworkUNSUPC

  15. Environmental Management Associates | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It isInformation ContractsCGNPC JVEnvergy

  16. Help:Managing files | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:Photon Place:NetHealth DivisionHelio

  17. How Communities Manage Forests | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:PhotonHolyName HousingIII Wind Farm FacilityPotSpringsHouston,How

  18. Using Operational Security (OPSEC) to Support a Cyber Security...

    Broader source: Energy.gov (indexed) [DOE]

    Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

  19. National Bald Eagle Management Guidelines | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte3Informationof EnergyNapaInformation UsEagle Management

  20. PIA - Human Resources Management Information System (HRMIS) | Department of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002OpticsPeriodical: Volume 5,PETPIVWebEnergy Information

  1. University of London International Academy MSc/PG Dip in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    a computing system secure. This process starts with defining the proper security requirements, which system level. In order to understand these security controls we need to describe some background material systems will be examined as well as security related issues of computer architecture. Specific well

  2. Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation

    E-Print Network [OSTI]

    number 428/11), Cabarnit Cyber Security MAGNET Consortium, Grant from the Institute for Future Defense;1 Introduction Secure multi-party computation (MPC) is a powerful concept in secure distributed computing Theoretically Secure Multi-Party Computation (Preliminary Report) Shlomi Dolev1 and Niv Gilboa2 and Ximing Li1 1

  3. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    SciTech Connect (OSTI)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

    2004-11-01T23:59:59.000Z

    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

  4. ACM Journal of Educational Resources in Computing, Vol. 6, No. 3, September 2006. Article 3. Teaching Context in Information Security

    E-Print Network [OSTI]

    Bishop, Matt

    __________________________________________________________________________________________ 1. INTRODUCTION Software engineers used standard software engineering processes to develop software political science, history, as well as other humanities, to force students to apply or derive principles and Protection General Terms: Management, Security Additional Key Words and Phrases: Environment, judgment

  5. The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses in length. Admission to the Faculty may occur at the end of Year One. Students are required to have the following courses for

    E-Print Network [OSTI]

    Seldin, Jonathan P.

    The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses-language university. BachelorofManagement ManagementInformationSystems Name Technology Management 4090 - Management Policy and Strategy Management 4840 - Systems Analysis Management

  6. Using Utility Information to Calibrate Customer Demand Management Behavior Models

    E-Print Network [OSTI]

    Using Utility Information to Calibrate Customer Demand Management Behavior Models Murat Fahrio 颅 Madison Report PSerc 99颅06 June 10, 1999 Abstract In times of stress customers can help a utility by means be optimized if the utility can estimate the outage or substitution costs of its customers. This report

  7. Department of Management Science and Information Systems Seminar

    E-Print Network [OSTI]

    Lin, Xiaodong

    Department of Management Science and Information Systems Seminar You are cordially invited, to provide a methodology for generating the conditional price-transition probabilities, as required's eBay store. We are using a model where each period there is a probability a price-transition occurs

  8. A Context Driven Information Retrieval for Online Urban Disaster Management System

    E-Print Network [OSTI]

    Paris-Sud XI, Universit茅 de

    A Context Driven Information Retrieval for Online Urban Disaster Management System Khaldoun ZREIK of Disaster Managing Approaches depends firmly on information and communication management system. Due to the interactive decision board, an optimised Data Base Management System, a light Geographical Information System

  9. System and method for acquisition management of subject position information

    DOE Patents [OSTI]

    Carrender, Curt (Morgan Hill, CA)

    2007-01-23T23:59:59.000Z

    A system and method for acquisition management of subject position information that utilizes radio frequency identification (RF ID) to store position information in position tags. Tag programmers receive position information from external positioning systems, such as the Global Positioning System (GPS), from manual inputs, such as keypads, or other tag programmers. The tag programmers program each position tag with the received position information. Both the tag programmers and the position tags can be portable or fixed. Implementations include portable tag programmers and fixed position tags for subject position guidance, and portable tag programmers for collection sample labeling. Other implementations include fixed tag programmers and portable position tags for subject route recordation. Position tags can contain other associated information such as destination address of an affixed subject for subject routing.

  10. There is an increasing order in digitized technology. This increasing order requires high qualitative document management system which can be used in secure fashion especially for organization with

    E-Print Network [OSTI]

    qualitative document management system which can be used in secure fashion especially for organization with different branches and different location. In this paper we propose a qualitative document management. The proposed framework provides the necessary options for creating an effective document management system

  11. A method of assessing users' vs managers' perceptions of safety and security problems in public beach park settings

    E-Print Network [OSTI]

    Steele, Robert James Scott

    2012-06-07T23:59:59.000Z

    while answering this form of report, research has proven that the respondents are generally truthful and accurate in the in- formation they provide (Sheley 1979; Levine 1982). Due to the transitory nature of park users this system would...A METHOD OF ASSESSING USERS' VS MANAGERS' PERCEPTIONS OF SAFETY AND SECURITY PROBLEMS IN PUBLIC BEACH PARK SETTINGS A Thesis by ROBERT JAMES SCOTT STEELE Submitted to the Graduate College of Texas A&M University In Par ial Fulfillment...

  12. Workforce Statistics - Office of Secure Transportation | National...

    National Nuclear Security Administration (NNSA)

    Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

  13. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  14. A Breakthrough for Prepaid Payment: End to End Token Exchange and Management Using Secure SSL Channels Created by EAP-TLS Smart Cards

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    A Breakthrough for Prepaid Payment: End to End Token Exchange and Management Using Secure SSL SSL tunnels between smart cards, or between smart cards and SSL servers. SSL [8] [9] is the de facto

  15. Corrective Action Management Units and Temporary Units. RCRA Information Brief

    SciTech Connect (OSTI)

    Not Available

    1994-03-01T23:59:59.000Z

    On February 16, 1993 the EPA published a final rule that allows either the EPA Regional Administrator or the authorized State to designate areas as corrective action management units (CAMUs) at hazardous waste management facilities for the specific purpose of managing remediation waste that has been generated as part of the facility`s corrective action activities. According to the rule, placement of remediation wastes into or within a CAMU does not constitute land disposal of hazardous waste and is not subject to RCRA land disposal restrictions. In addition, waste disposal units located within CAMUs are not required to be designed in accordance with RCRA minimum technological requirements applicable to land disposal units. This Information Brief explains the advantages of a CAMU designation, defines a Temporary Unit (TU) and explains the advantages of a TU designation. The process for initiating a CAMU or TU designation is described for DOE sites and interim status facilities.

  16. Nevada National Security Site 2012 Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    Hudson, David B.

    2013-09-10T23:59:59.000Z

    Environmental monitoring data are collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, and vadose zone. This report summarizes the 2012 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports (National Security Technologies, LLC, 2012; 2013a; 2013b). Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Slightly elevated exposure levels outside the Area 3 RWMS are attributed to nearby historical aboveground nuclear weapons tests. Air monitoring data show tritium concentrations in water vapor and americium and plutonium concentrations in air particles are only slightly above detection limits and background levels. The measured levels of radionuclides in air particulates and moisture are below Derived Concentration Standards for these radionuclides. Groundwater monitoring data indicate the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by RWMS operations. Results of groundwater analysis from wells around the Area 5 RWMS were all below established investigation levels. Leachate samples collected from the leachate collection system at the mixed low-level waste cell were below established contaminant regulatory limits. The 133.9 millimeters (mm) (5.27 inches [in.]) of precipitation at the Area 3 RWMS during 2012 is 12% below the average of 153.0 mm (6.02 in.), and the 137.6 mm (5.42 in.) of precipitation at the Area 5 RWMS during 2012 is 11% below the average of 122.4 mm (4.82 in.). Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Automated vadose zone monitoring on Area 5 and Area 3 RWMS cell covers show no evidence of precipitation percolating through the cover to the waste. Moisture from precipitation did not percolate below 60 centimeters (cm) (2 feet [ft]) in the vegetated final cover on the U-3ax/bl disposal unit at the Area 3 RWMS, and moisture from precipitation and irrigation did not percolate below 45 cm (1.5 ft) on the 92-Acre Area final cover. Irrigation was applied to this cover for seed germination and plant growth. During 2012, there was no drainage through 2.4 meters (8 ft) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Twenty percent of the applied precipitation and irrigation drained from the bare-soil drainage lysimeter that received 3 times natural precipitation. All 2012 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

  17. Nevada National Security Site 2010 Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Sites

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2011-06-01T23:59:59.000Z

    Environmental monitoring data were collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, vadose zone, subsidence, and biota. This report summarizes the 2010 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports (National Security Technologies, LLC, 2010a; 2010b; 2011). Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Air monitoring data at the Area 3 and Area 5 RWMSs indicate that tritium concentrations are slightly above background levels. All gamma spectroscopy results for air particulates collected at the Area 3 and Area 5 RWMS were below the minimum detectable concentrations, and concentrations of americium and plutonium are only slightly above detection limits. The measured levels of radionuclides in air particulates and moisture are below derived concentration guides for these radionuclides. Groundwater monitoring data indicate that the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by facility operations. The 246.9 millimeters (mm) (9.72 inches [in.]) of precipitation at the Area 3 RWMS during 2010 is 56 percent above the average of 158.7 mm (6.25 in.), and the 190.4 mm (7.50 in.) of precipitation at the Area 5 RWMS during 2010 is 50 percent above the average of 126.7 mm (4.99 in.). Soil-gas tritium monitoring at borehole GCD-05 continues to show slow subsurface migration consistent with previous results. Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Data from the automated vadose zone monitoring system for the operational waste pit covers show that moisture from precipitation did not percolate below 90 centimeters (cm) (3 feet [ft]) before being removed by evaporation. Moisture from precipitation did not percolate below 61 cm (2 ft) in the vegetated final mono-layer cover on the U-3ax/bl disposal unit at the Area 3 RWMS before being removed by evapotranspiration. During 2010, there was no drainage through 2.4 meters (8 ft) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Water drained from both the bare-soil drainage lysimeter and the invader species drainage lysimeter that received 3 times natural precipitation. All 2010 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

  18. Nevada National Security Site 2013 Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    Hudson, D. B.

    2014-08-19T23:59:59.000Z

    Environmental monitoring data are collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) within the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, and vadose zone. This report summarizes the 2013 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports (National Security Technologies, LLC, 2013; 2014a; 2014b). Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Slightly elevated exposure levels outside the Area 3 RWMS are attributed to nearby historical aboveground nuclear weapons tests. Air monitoring data show tritium concentrations in water vapor and americium and plutonium concentrations in air particles are close to detection limits and background levels. The measured levels of radionuclides in air particulates and moisture are below Derived Concentration Standards for these radionuclides. Groundwater monitoring data indicate the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by RWMS operations. Results of groundwater analysis from wells around the Area 5 RWMS were all below established investigation levels. Leachate samples collected from the leachate collection system at the mixed low-level waste cell were below established contaminant regulatory limits. The 105.8 millimeters (mm) (4.17 inches [in.]) of precipitation at the Area 3 RWMS during 2013 is 30% below the average of 150.3 mm (5.92 in.), and the 117.5 mm (4.63 in.) of precipitation at the Area 5 RWMS during 2013 is 5% below the average of 123.6 mm (4.86 in.). Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Automated vadose zone monitoring on Area 5 and Area 3 RWMS cell covers show no evidence of precipitation percolating through the cover to the waste. Moisture from precipitation did not percolate below 60 centimeters (cm) (2 feet [ft]) in the vegetated final cover on the U-3ax/bl disposal unit at the Area 3 RWMS, and moisture from precipitation and irrigation did not percolate below 45 cm (1.5 ft) on the 92-Acre Area final cover. Irrigation was applied to this cover for seed germination and plant growth. During 2013, there was no drainage through 2.4 meters (8 ft) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Twenty percent of the applied precipitation and irrigation drained from the bare-soil drainage lysimeter that received 3-times natural precipitation. All 2013 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

  19. KNOWLEDGE: Building, Securing, Sharing & Applying

    E-Print Network [OSTI]

    is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

  20. The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses in length. Admission to the Faculty may occur at the end of Year One. Students are required to have completed the following

    E-Print Network [OSTI]

    Seldin, Jonathan P.

    The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses. BachelorofManagement ManagementInformationSystems Name Systems Management Management 3080 - Managerial Skill Development *Management 3380 - Technological Change

  1. The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses in length. Admission to the Faculty may occur at the end of Year One. Students are required to have completed the following

    E-Print Network [OSTI]

    Seldin, Jonathan P.

    The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses. BachelorofManagement ManagementInformationSystems Name Systems Management Management 3080 - Managerial Skill Development Management 3380 - Technological Change

  2. MANAGEMENT INFORMATION SYSTEMS (MIS) In a technology bound society, companies rely on

    E-Print Network [OSTI]

    to the $44,000 Clay Barton Scholarship. Admission When you choose to major in Management Information Systems business, management, marketing, operations management, and personal selling. The W. Frank Barton School

  3. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  4. MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies

    E-Print Network [OSTI]

    Garcia-Alfaro, Joaquin

    of configuration policies over network security components, such as firewalls, intrusion detection systems, and VPN the advances in the field of network security technologies, such as filtering of traffic, use of encrypted be exploited by unauthorized parties. The use of firewalls, NIDSs (network intrusion detection systems

  5. Federal Emergency Management Information System (FEMIS) Data Management Guide Version 1.3

    SciTech Connect (OSTI)

    Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Hoza, M.; Johnson, S.M.; Loveall, R.M.; Millard, W.D.; Winters, C.; Wood, B.M.

    1996-12-01T23:59:59.000Z

    FEMIS is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. FEMIS is designed to help civilian emergency management personnel to plan for and support their responses to a chemical-releasing event at a military chemical stockpile. This guide provides the background as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the datafiles and database. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, loaded, and managed while the system is in operation.

  6. Technology & Information Management B.S. Degree Curriculum Chart: 2013-2014

    E-Print Network [OSTI]

    Stuart, Josh

    Technology & Information Management B.S. Degree Curriculum Chart: 2013-2014 http Analysis & Design * TIM 105 Management of Technology I * TIM 125 Management of Technology II #* TIM 158 Business Strategy & Information Systems TIM 101 Management of Technology Seminar (2 units) * MATH 19B

  7. Technology & Information Management B.S. Degree Curriculum Chart: 2014-2015

    E-Print Network [OSTI]

    Stuart, Josh

    Technology & Information Management B.S. Degree Curriculum Chart: 2014-2015 http Analysis & Design * TIM 105 Management of Technology I * TIM 125 Management of Technology II #* TIM 158 Business Strategy & Information Systems TIM 101 Management of Technology Seminar (2 units) * MATH 19B

  8. D and D Knowledge Management Information Tool - 2012 - 12106

    SciTech Connect (OSTI)

    Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P. [Applied Research Center, Florida International University, Miami. FL 33174 (United States); DeGregory, J. [Office of D and D and Facility Engineering, Environmental Management, Department of Energy (United States)

    2012-07-01T23:59:59.000Z

    Deactivation and decommissioning (D and D) work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with the different ALARA (As-Low-As-Reasonably-Achievable) Centers, DOE sites, Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. D and D KM-IT provides single point access to all D and D related activities through its knowledge base. It is a community driven system. D and D KM-IT makes D and D knowledge available to the people who need it at the time they need it and in a readily usable format. It uses the World Wide Web as the primary source for content in addition to information collected from subject matter specialists and the D and D community. It brings information in real time through web based custom search processes and its dynamic knowledge repository. Future developments include developing a document library, providing D and D information access on mobile devices for the Technology module and Hotline, and coordinating multiple subject matter specialists to support the Hotline. The goal is to deploy a high-end sophisticated and secured system to serve as a single large knowledge base for all the D and D activities. The system consolidates a large amount of information available on the web and presents it to users in the simplest way possible. (authors)

  9. Storing and managing information artifacts collected by information analysts using a computing device

    DOE Patents [OSTI]

    Pike, William A; Riensche, Roderick M; Best, Daniel M; Roberts, Ian E; Whyatt, Marie V; Hart, Michelle L; Carr, Norman J; Thomas, James J

    2012-09-18T23:59:59.000Z

    Systems and computer-implemented processes for storage and management of information artifacts collected by information analysts using a computing device. The processes and systems can capture a sequence of interactive operation elements that are performed by the information analyst, who is collecting an information artifact from at least one of the plurality of software applications. The information artifact can then be stored together with the interactive operation elements as a snippet on a memory device, which is operably connected to the processor. The snippet comprises a view from an analysis application, data contained in the view, and the sequence of interactive operation elements stored as a provenance representation comprising operation element class, timestamp, and data object attributes for each interactive operation element in the sequence.

  10. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  11. Quantifiably secure power grid operation, management, and evolution : a study of uncertainties affecting the grid integration of renewables.

    SciTech Connect (OSTI)

    Gray, Genetha Anne; Watson, Jean-Paul [Sandia National Laboratories, Albuquerque, NM; Silva Monroy, Cesar Augusto [Sandia National Laboratories, Albuquerque, NM; Gramacy, Robert B. [University of Chicago, Chicago, IL

    2013-09-01T23:59:59.000Z

    This report summarizes findings and results of the Quantifiably Secure Power Grid Operation, Management, and Evolution LDRD. The focus of the LDRD was to develop decisionsupport technologies to enable rational and quantifiable risk management for two key grid operational timescales: scheduling (day-ahead) and planning (month-to-year-ahead). Risk or resiliency metrics are foundational in this effort. The 2003 Northeast Blackout investigative report stressed the criticality of enforceable metrics for system resiliency - the grid's ability to satisfy demands subject to perturbation. However, we neither have well-defined risk metrics for addressing the pervasive uncertainties in a renewable energy era, nor decision-support tools for their enforcement, which severely impacts efforts to rationally improve grid security. For day-ahead unit commitment, decision-support tools must account for topological security constraints, loss-of-load (economic) costs, and supply and demand variability - especially given high renewables penetration. For long-term planning, transmission and generation expansion must ensure realized demand is satisfied for various projected technological, climate, and growth scenarios. The decision-support tools investigated in this project paid particular attention to tailoriented risk metrics for explicitly addressing high-consequence events. Historically, decisionsupport tools for the grid consider expected cost minimization, largely ignoring risk and instead penalizing loss-of-load through artificial parameters. The technical focus of this work was the development of scalable solvers for enforcing risk metrics. Advanced stochastic programming solvers were developed to address generation and transmission expansion and unit commitment, minimizing cost subject to pre-specified risk thresholds. Particular attention was paid to renewables where security critically depends on production and demand prediction accuracy. To address this concern, powerful filtering techniques for spatio-temporal measurement assimilation were used to develop short-term predictive stochastic models. To achieve uncertaintytolerant solutions, very large numbers of scenarios must be simultaneously considered. One focus of this work was investigating ways of reasonably reducing this number.

  12. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  13. Nevada National Security Site 2011 Waste Management Monitoring Report, Area 3 and Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2012-07-31T23:59:59.000Z

    Environmental monitoring data are collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, and vadose zone. This report summarizes the 2011 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports. Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Slightly elevated exposure levels outside the Area 3 RWMS are attributed to nearby historical aboveground nuclear weapons tests. Air monitoring data show tritium concentrations in water vapor and americium and plutonium concentrations in air particles are only slightly above detection limits and background levels. The measured levels of radionuclides in air particulates and moisture are below derived concentration guides for these radionuclides. During the last 2 weeks of March 2011, gamma spectroscopy results for air particles showed measurable activities of iodine-131 (131I), cesium-134 (134Cs), and cesium-137 (137Cs). These results are attributed to the release of fission products from the damaged Fukushima Daiichi power plant in Japan. The remaining gamma spectroscopy results for air particulates collected at the Area 3 and Area 5 RWMS were below minimum detectable concentrations. Groundwater monitoring data indicate the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by RWMS operations. Results of groundwater analysis from wells around the Area 5 RWMS were all below established investigation levels. The 86.3 millimeters (mm) (3.40 inches [in.]) of precipitation at the Area 3 RWMS during 2011 is 44% below the average of 154.1 mm (6.07 in.), and the 64.8 mm (2.55 in.) of precipitation at the Area 5 RWMS during 2011 is 47% below the average of 122.4 mm (4.82 in.). Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Automated vadose zone monitoring on Area 5 RWMS operational waste covers was not done during 2011 due to construction of the final evapotranspiration cover at these monitoring locations. Moisture from precipitation did not percolate below 122 centimeters (4 feet) in the vegetated final mono-layer cover on the U-3ax/bl disposal unit at the Area 3 RWMS before being removed by evapotranspiration. During 2011, there was no drainage through 2.4 meters (8 feet) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Ten percent of the applied precipitation and irrigation drained from the bare-soil drainage lysimeter that received 3 times natural precipitation. All 2011 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

  14. Bioinformatics process management: information flow via a computational journal

    E-Print Network [OSTI]

    Feagan, Lance; Rohrer, Justin P.; Garrett, Alexander S.; Amthauer, Heather A.; Komp, Ed; Johnson, David; Hock, Adam; Clark, Terry; Lushington, Gerald H.; Minden, Gary J.; Frost, Victor S.

    2007-12-03T23:59:59.000Z

    ral Source Code for Biology and ssBioMed CentMedicine Open AcceResearch Bioinformatics process management: information flow via a computational journal Lance Feagan, Justin Rohrer, Alexander Garrett, Heather Amthauer, Ed Komp, David Johnson...@ittc.ku.edu; Alexander Garrett - agarrett@ittc.ku.edu; Heather Amthauer - amthah@ittc.ku.edu; Ed Komp - komp@ittc.ku.edu; David Johnson - habib@ittc.ku.edu; Adam Hock - ahock@ittc.ku.edu; Terry Clark - tclark@ittc.ku.edu; Gerald Lushington - glushington@ku.edu; Gary...

  15. ADEQ Nonpoint Source State Management Plan | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights,Information Of TheFixed Logo: ACOREState Management

  16. Executive Order 11988 - Floodplain Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It isInformationexplains a4Evendale, - Floodplain Management Jump to:

  17. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Shepp, Larry

    . The FBI may be able to help you determine if these contacts pose any risk to you or your company. Change unusual circumstances or noteworthy incidents to your security officer and to the FBI. Notifying the FBI and country threat assessments are available from the FBI upon request. Good security habits will help protect

  18. Federal Emergency Management Information System (FEMIS). Data Management Guide, FEMIS: Phase 1, Version 1.1u

    SciTech Connect (OSTI)

    Burnett, R.A.; Johnson, D.M.; Johnson, S.M. [and others

    1995-06-01T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the U.S. Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system.

  19. DOE technology information management system database study report

    SciTech Connect (OSTI)

    Widing, M.A.; Blodgett, D.W.; Braun, M.D.; Jusko, M.J.; Keisler, J.M.; Love, R.J.; Robinson, G.L. [Argonne National Lab., IL (United States). Decision and Information Sciences Div.

    1994-11-01T23:59:59.000Z

    To support the missions of the US Department of Energy (DOE) Special Technologies Program, Argonne National Laboratory is defining the requirements for an automated software system that will search electronic databases on technology. This report examines the work done and results to date. Argonne studied existing commercial and government sources of technology databases in five general areas: on-line services, patent database sources, government sources, aerospace technology sources, and general technology sources. First, it conducted a preliminary investigation of these sources to obtain information on the content, cost, frequency of updates, and other aspects of their databases. The Laboratory then performed detailed examinations of at least one source in each area. On this basis, Argonne recommended which databases should be incorporated in DOE`s Technology Information Management System.

  20. Risk Informed Margins Management as part of Risk Informed Safety Margin Characterization

    SciTech Connect (OSTI)

    Curtis Smith

    2014-06-01T23:59:59.000Z

    The ability to better characterize and quantify safety margin is important to improved decision making about Light Water Reactor (LWR) design, operation, and plant life extension. A systematic approach to characterization of safety margins and the subsequent margin management options represents a vital input to the licensee and regulatory analysis and decision making that will be involved. In addition, as research and development in the LWR Sustainability (LWRS) Program and other collaborative efforts yield new data, sensors, and improved scientific understanding of physical processes that govern the aging and degradation of plant SSCs needs and opportunities to better optimize plant safety and performance will become known. To support decision making related to economics, readability, and safety, the Risk Informed Safety Margin Characterization (RISMC) Pathway provides methods and tools that enable mitigation options known as risk informed margins management (RIMM) strategies.

  1. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01T23:59:59.000Z

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  2. U.S. DEPARTMENT OF ENERGY Information Collection Clearance Manager...

    Office of Environmental Management (EM)

    (City, State) Security Classification Email Phone Number SECTION III. Appointee Acknowledgement I acknowledge my collateral duty appointment until canceled by the Approving...

  3. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    SciTech Connect (OSTI)

    Jesse Schreiber

    2008-03-01T23:59:59.000Z

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America抯 nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 揼reen technology.

  4. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    SciTech Connect (OSTI)

    Jesse Schrieber

    2008-07-01T23:59:59.000Z

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America抯 nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization and improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 揼reen technology.

  5. Future Trends in Secure Chip Data Management Nicolas Anciaux, Luc Bouganim and Philippe Pucheral

    E-Print Network [OSTI]

    of scaling down database techniques for the smart card and proposed the design of a DBMS kernel called PicoDBMS. This paper summarizes the learning obtained during an extensive performance analysis of PicoDBMS. Then it studies to which extent secure chips hardware evolution should impact the design of embedded data

  6. 1EMC CONFIDENTIAL--INTERNAL USE ONLY Cloud based Personal Information Management

    E-Print Network [OSTI]

    1EMC CONFIDENTIAL--INTERNAL USE ONLY Cloud based Personal Information Management 颅 Introduction to EMC Cloud Computing Jidong Chen Sr. Research Scientist Information Management Group EMC Research China Dec., 2008 #12;2EMC CONFIDENTIAL--INTERNAL USE ONLY Agenda Introduction to Personal Information Cloud

  7. Management innovations at outstanding information technology companies and implications for China

    E-Print Network [OSTI]

    Chan, Erik Chi-Hein

    2010-01-01T23:59:59.000Z

    Over the past few decades, information technology has fundamentally changed the way we work as a society. Managers often forget that management itself also needs to change along with our evolving society. It is an opportunity, ...

  8. Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.5

    SciTech Connect (OSTI)

    Bower, John C. (BATTELLE (PACIFIC NW LAB)); Burnett, Robert A. (BATTELLE (PACIFIC NW LAB)); Carter, Richard J. (BATTELLE (PACIFIC NW LAB)); Downing, Timothy R. (BATTELLE (PACIFIC NW LAB)); Homer, Brian J. (BATTELLE (PACIFIC NW LAB)); Holter, Nancy A. (BATTELLE (PACIFIC NW LAB)); Johnson, Daniel M. (BATTELLE (PACIFIC NW LAB)); Johnson, Ranata L. (BATTELLE (PACIFIC NW LAB)); Johnson, Sharon M. (BATTELLE (PACIFIC NW LAB)); Loveall, Robert M. (BATTELLE (PACIFIC NW LAB)); Ramos Jr., Juan (BATTELLE (PACIFIC NW LAB)); Schulze, Stacy A. (BATTELLE (PACIFIC NW LAB)); Sivaraman, Chitra (BATTELLE (PACIFIC NW LAB)); Stephan, Alex J. (BATTELLE (PACIFIC NW LAB)); Stoops, Lamar R. (BATTELLE (PACIFIC NW LAB)); Wood, Blanche M. (BATTELLE (PACIFIC NW LAB))

    2001-12-01T23:59:59.000Z

    The Federal Emergency Management System (FEMIS) is an emergency management planning and response tool. The FEMIS System Administration Guide provides information on FEMIS System Administrator activities as well as the utilities that are included with FEMIS.

  9. Directory Information Restriction Use this form to manage public access to your data at Boston University

    E-Print Network [OSTI]

    Guenther, Frank

    Directory Information Restriction Use this form to manage public access to your data at Boston identifiable information as "Directory Information." A list of this information is below. Unless restricted, Boston University may disclose any of the items of Directory Information without your consent. Boston

  10. An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Request for Information

    E-Print Network [OSTI]

    .S. Department of Energy's NNSA ASM-SUB Request for Information Los Alamos National Laboratory Field Instruments by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA General Tasks On

  11. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  12. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  13. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  14. Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE

    E-Print Network [OSTI]

    , authentication, provenance, and access control. Keywords-network cyber security; identity management; information environment, players1 are guided through a series of scenarios that highlight various cyber security education colleges. CyberCIEGE was created by the Center for Information Systems Security Studies and Research (CISR

  15. The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses in length. Admission to the Faculty may occur at the end of Year One. Students are required to have the following courses for

    E-Print Network [OSTI]

    Seldin, Jonathan P.

    The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses ManagementInformationSystems Name: __________________________________________________________ ID 4840 - Systems Analysis Management 4841 - Systems Design One of: Management 3380 - Technological Change

  16. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

  17. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  19. Essays on the relation between managers' incentives and financial accounting information

    E-Print Network [OSTI]

    Xue, Yanfeng, 1974-

    2004-01-01T23:59:59.000Z

    (cont.) around thresholds do convey information about a firm's future performance, firms with a higher degree of information asymmetry between the management and investors are more likely to use this signaling mechanism, ...

  20. Quantifying improvements in the Engineering-Procurement-Construction (EPC) process from the implementation of information management strategies within materials management

    E-Print Network [OSTI]

    Toon, Jeffrey Lee

    1997-01-01T23:59:59.000Z

    Throughout all industries where material flow or handling is involved, employers have implemented various information management technologies with the following goals: 1) to reduce cost, time, and effort, 2) to improve productivity, 3) to streamline...

  1. Insurance as a Risk Management Instrument for Energy Infrastructure Security and Resilience Report Now Available

    Broader source: Energy.gov [DOE]

    The Office of Electricity Delivery and Energy Reliability has released a report that examines the key risks confronting critical energy infrastructure and ways in which the insurance industry can help manage these risks. In most developed countries, insurance is one of the principal risk management instruments for aiding in recovery after a disaster and for encouraging future investments that are more resilient to potential hazards.

  2. ORISE National Security and Emergency Management: How to Work with Us

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControlsOMB Policies OR I GI NHow

  3. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1993-06-01T23:59:59.000Z

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  4. Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Universit茅 de

    for Secure Information Technology, Rheinstrasse 75, 64295 Darmstadt, Germany, hervais and systems pose specific requirements and because of the diversity of network access technologies of user identities and rights are not compatible. Especially for SMEs identity management and access

  5. Managerial information behaviour: Relationships among Total Quality Management orientation, information use environments, and managerial roles

    E-Print Network [OSTI]

    Simard, C; Rice, Ronald E

    2006-01-01T23:59:59.000Z

    total quality management and socio-technical systems theory.management creates control systems that maintain and improve quality,

  6. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  7. Dynamic access policies for unconditionally secure secret

    E-Print Network [OSTI]

    Martin, Keith

    generation of cryptographic secrets 路 Key management in distributed environments 路 Multiparty computation #12 Awaji Island, Japan 2 Ueli's orders 路 Choose a topic related to information theoretic security 路 Provide an overview 路 Identify some open problems 路 Give a "nice talk" #12;ITW 2005 Awaji Island, Japan 3 A little bit

  8. Appears in Secure Data Management: Second VLDB Workshop--SDM 2005, Lecture Notes in Computer Science 3674 (2005) 3346. Springer-Verlag. Experiments With Queries Over Encrypted

    E-Print Network [OSTI]

    Schoenmakers, Berry

    Appears in Secure Data Management: Second VLDB Workshop--SDM 2005, Lecture Notes in Computer which data was queried. The idea behind PIR is to replicate the data among several non that no server will learn the whole query by itself. Chor et al [4] prove that PIR with a single server can only

  9. Physics Department Management Review

    E-Print Network [OSTI]

    Homes, Christopher C.

    ESSH Committee and Work Planning Security Cyber Security Accident and Incident Management was distributed to the ESSH Committee, Group Leaders, Group Safety Coordinators, and Line Management #12;Areas

  10. Bachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis, 2014-2015

    E-Print Network [OSTI]

    Barrash, Warren

    Clinical Practice HLTHST 431 Quality Issues in Health Care HLTHST 437 Health Information ManagementBachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis BIOL 192 or BIOL 228 HLTHST 101 Medical Terminology HLTHST 202 Health Delivery Systems HLTHST 215

  11. Bachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis, 2012-2013

    E-Print Network [OSTI]

    Barrash, Warren

    Practice HLTHST 431 Quality Issues in Health Care HLTHST 437 Health Information Management ClinicalBachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis BIOL 192 or BIOL 228 4 HLTHST 101 Medical Terminology 3 HLTHST 202 Health Delivery Systems 3 HLTHST 215

  12. Bachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis, 2013-2014

    E-Print Network [OSTI]

    Barrash, Warren

    Clinical Practice HLTHST 431 Quality Issues in Health Care HLTHST 437 Health Information ManagementBachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis BIOL 192 or BIOL 228 HLTHST 101 Medical Terminology HLTHST 202 Health Delivery Systems HLTHST 215

  13. Department of Management Science & Information System. Rutgers Business SchoolNewark and New Brunswick

    E-Print Network [OSTI]

    Lin, Xiaodong

    . Department of Management Science & Information System. Rutgers Business School颅Newark and New of Management Science and Information Systems of Rutgers Business School 颅 Newark and New Brunswick invites of Rutgers, the State University of New Jersey, which is a vibrant public research university. The Rutgers

  14. Department of Management Science & Information System. Rutgers Business SchoolNewark and New Brunswick

    E-Print Network [OSTI]

    Lin, Xiaodong

    . Department of Management Science & Information System. Rutgers Business School颅Newark and New of Management Science and Information Systems of Rutgers Business School 颅 Newark and New Brunswick invites is a vibrant public research university. The Rutgers Business School is located in two campuses: Newark and New

  15. Office of Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management develops and interprets Government-wide policies and procedures and conducts training to ensure the accurate identification of information and documents that must be classified or controlled under statute or Executive order to protect the national security and controlled unclassified Official Use Only information for the effective operation of the Government.

  16. Trends in Energy Management Technology - Part 4: Review ofAdvanced Applications in Energy Management, Control, and InformationSystems

    SciTech Connect (OSTI)

    Yee, Gaymond; Webster, Tom

    2003-08-01T23:59:59.000Z

    In this article, the fourth in a series, we provide a review of advanced applications in Energy Management, Control, and Information Systems (EMCIS). The available features for these products are summarized and analyzed with regard to emerging trends in EMCIS and potential benefits to the Federal sector. The first article [1] covered enabling technologies for emerging energy management systems. The second article [2] serves as a basic reference for building control system (BCS) networking fundamentals and includes an assessment of current approaches to open communications. The third article [3] evaluated several products that exemplify the current state of practice in EMCIS. It is important for energy managers in the Federal sector to have a high level of knowledge and understanding of these complex energy management systems. This series of articles provides energy practitioners with some basic informational and educational tools to help make decisions relative to energy management systems design, specification, procurement, and energy savings potential.

  17. The encryption requirement can be waived for certain circumstances. Contact the Chief Information Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO.

    E-Print Network [OSTI]

    ' Information Technology policies require that any mobile device containing institutional data must be encrypted Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO. This directive Information Technology Appropriate Use Policy Colorado School of Mines Administrative Data Policy Mines

  18. Independent Oversight Inspection, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

  19. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  20. Design and implementation of a departmental information management system

    E-Print Network [OSTI]

    Xie, Dawen

    2009-05-15T23:59:59.000Z

    Management System (DBMS); 4. logical design; 5. physical design and 6. implementation. The following section brie y walks through each step [5]. The goals of the requirements analysis (Step 1) are to determine the data re- quirements of the database in terms... program, a degree program involves di erent documents. A Database Management System (DBMS) is computer software designed for the purpose of managing databases. Typical examples of DBMSs include Oracle, Microsoft SQL Server, and MySQL. Step 3 involves...

  1. Applying Data Mining Techniques to Address Disaster Information Management Challenges on Mobile Devices

    E-Print Network [OSTI]

    Chen, Shu-Ching

    Applying Data Mining Techniques to Address Disaster Information Management Challenges on Mobile a collaborative solution on a mobile platform using advanced data mining and information retrieval techniques.8 [Database Applications]: Data mining; H.3.3 [Information Search and Retrieval]: Clustering; H.3.5 [Online

  2. Management of Los Alamos National Laboratory's Cyber Security Program, IG-0880

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement ControlsVHTRManagement

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  4. Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.6

    SciTech Connect (OSTI)

    Downing, Timothy R.; Fangman, Patricia M.; Homer, Brian J.; Johnson, Daniel M.; Johnson, Ranata L.; Johnson, Sharon M.; Millard, W. David; Stoops, Lamar R.; Wood, Blanche M.

    1999-03-05T23:59:59.000Z

    Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.6

  5. 29.01.03.M1.09 Information Resources Incident Management Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    likelihood that security incidents could be propagated to other systems beyond departmental control, system, process, store, retrieve, display, and transmit information or data. SIRS Security Incident Reporting follow System Regulation 10.02.01, Control of Fraud, Waste and Abuse. 2.6 If there is a substantial

  6. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  7. Design of a digital dissertation information management system

    E-Print Network [OSTI]

    Gobinda G.; Chowdhury, G.G.C.; Program: Electronic Library and Information Systems Volume 36 pp 152-165 [More Details

    Gobinda G. Chowdhury,G.G.C. Program: Electronic Library and Information Systems Volume 36 pp 152-165

  8. Generalized Information Architecture for Managing Requirements in IBM?s Rational DOORS(r) Application.

    SciTech Connect (OSTI)

    Aragon, Kathryn M.; Eaton, Shelley M.; McCornack, Marjorie T.; Shannon, Sharon A.

    2014-12-01T23:59:59.000Z

    When a requirements engineering effort fails to meet expectations, often times the requirements management tool is blamed. Working with numerous project teams at Sandia National Laboratories over the last fifteen years has shown us that the tool is rarely the culprit; usually it is the lack of a viable information architecture with well- designed processes to support requirements engineering. This document illustrates design concepts with rationale, as well as a proven information architecture to structure and manage information in support of requirements engineering activities for any size or type of project. This generalized information architecture is specific to IBM's Rational DOORS (Dynamic Object Oriented Requirements System) software application, which is the requirements management tool in Sandia's CEE (Common Engineering Environment). This generalized information architecture can be used as presented or as a foundation for designing a tailored information architecture for project-specific needs. It may also be tailored for another software tool. Version 1.0 4 November 201

  9. ITL BULLETIN FOR NOVEMBER 2010 THE EXCHANGE OF HEALTH INFORMATION: DESIGNING A SECURITY

    E-Print Network [OSTI]

    is adequately addressed throughout the system development life cycle, and that data protection mechanisms. This approach involves addressing the protection of health information throughout the system development life cycle, and applying protective mechanisms, including contingency and disaster recovery planning

  10. Managing perceptions of information overload in computer-mediated communication

    E-Print Network [OSTI]

    Chen, Chun-Ying

    2005-02-17T23:59:59.000Z

    difficulties on students? learning in online discussions, and (c) to identify students? strategies for avoiding or managing those difficulties in order to engage in quality learning. Interviews with students and computer conferencing transcripts were analyzed...

  11. MANAGEMENT INFORMATION SYSTEMS What can I do with this major?

    E-Print Network [OSTI]

    Hemmers, Oliver

    institutions Insurance companies Consulting firms Manufacturers Computer companies Telecommunications companies Retailers Healthcare organizations Hotels and restaurants Entertainment companies Environmental management, government and non- governmental organizations including: Financial institutions Insurance companies

  12. Michael N. Katehakis Department of Management Science & Information Systems

    E-Print Network [OSTI]

    sam- pling", (with Govindarajulu Z.) published in a special volume of the American Journal), New Jersey, Professor, 1989 - present Taught courses on business analytics, stochastic models in supply chain management, stochastic pro- cesses, data models and decisions, deterministic models

  13. Risk-informed incident management for nuclear power plants

    E-Print Network [OSTI]

    Smith, Curtis Lee, 1966-

    2002-01-01T23:59:59.000Z

    Decision making as a part of nuclear power plant operations is a critical, but common, task. Plant management is forced to make decisions that may have safety and economic consequences. Formal decision theory offers the ...

  14. Exploring Volunteered Geographic Information (VGI) for Emergency Management: Toward a Wiki GIS Framework

    E-Print Network [OSTI]

    Xu, Chen

    2011-10-21T23:59:59.000Z

    The past three years have witnessed unprecedented growth of user-generated volunteered geographic information (VGI) on the Web. Although scholars, decision makers, and citizens have recognized the potential value of VGI in emergency management...

  15. ISSIGreviewProject Management Institute--Information Systems Specific Interest Group Fourth Quarter 2000

    E-Print Network [OSTI]

    2000 Volume 10, Number 4 Supporting Project Management in an Information Systems Environment PMI & SIG News:PMI & SIG News:PMI & SIG News:PMI & SIG News:PMI & SIG News: ISSIG Communications Update

  16. Deactivation & Decommissioning Knowledge Management Information Tool (D&D KM-IT)

    Broader source: Energy.gov [DOE]

    The Deactivation and Decommissioning Knowledge Management Information Tool (D&D KM-IT) serves as a centralized repository providing a common interface for all D&D related activities.

  17. Knowledge Discovery, Knowledge Management and Enterprise-Wide Information Technology Tools Final Report

    SciTech Connect (OSTI)

    Patton, Robert M [ORNL; Symons, Christopher T [ORNL; Gorman, Bryan L [ORNL; Treadwell, Jim N [ORNL

    2012-04-01T23:59:59.000Z

    A final report on an ORNL task to establish a knowledge discovery and management tool to retrieve and recommend information from existing S&T documents for the Office of Naval Research Global.

  18. Potential use of electronic information for natural resource management by private landowners in Texas

    E-Print Network [OSTI]

    Hays, Amy E

    2012-06-07T23:59:59.000Z

    A mail survey of Texas' private landowners was conducted in the fall of 1996 to assess the potential use of electronic information sources as a tool for natural resource management. Eight hundred private landowners in rural communities were asked...

  19. Nevada National Security Site 2012 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2013-02-11T23:59:59.000Z

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2012 results. During 2012, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Groundwater samples were collected at UE5PW-1, UE5PW-2, and UE5PW-3 on March 21, August 7, August 21, and September 11, 2012, and static water levels were measured at each of the three pilot wells on March 19, June 6, August 2, and October 15, 2012. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Final results from samples collected in 2012 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  20. Nevada National Security Site 2010 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2011-01-01T23:59:59.000Z

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2010 results. During 2010, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 10 and August 10, 2010; at UE5PW-2 on March 10, August 10, and August 25, 2010; and at UE5PW-3 on March 31, August 10, and August 25, 2010. Static water levels were measured at each of the three pilot wells on March 1, April 26, August 9, and November 9, 2010. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Results from all samples collected in 2010 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  1. Information Management | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial CarbonArticlesHumanJuneDocumentingFermiGeorgeHerbert

  2. The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses in length. Admission to the Faculty may occur at the end of Year One. Students are required to have completed the following

    E-Print Network [OSTI]

    Seldin, Jonathan P.

    The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses completion of a recognized degree from an English-language university. BachelorofManagement ManagementInformationSystems 4090 - Management Policy and Strategy Management 4840 - Systems Analysis Management 4841 - Systems

  3. Emergency Management Concepts, Existing Guidance, and Changes

    Broader source: Energy.gov [DOE]

    Presenter: David Freshwater, Emergency Management Specialist, Office of Emergency Management, National Nuclear Security Administration

  4. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  5. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

  6. Special Analysis of the Area 3 Radioactive Waste Management Site at the Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    National Security Technologies, LLC, Environmental Management

    2012-09-30T23:59:59.000Z

    This report describes the methods and results of a special analysis (SA) of the Area 3 Radioactive Waste Management Site (RWMS) on the Nevada National Security Site (NNSS). The purpose of the SA is to determine if the approved performance assessment (PA) and composite analysis (CA) (Shott et al., 2001) remain valid. The Area 3 RWMS PA and CA were prepared as a single document and received conditional approval on October 6, 1999. A conditional Disposal Authorization Statement (DAS) for the Area 3 RWMS was issued on October 20, 1999. Since preparation of the approved PA and CA, new information and additional environmental monitoring data have been used to update the PA and CA. At the same time, continual advancements in computer processors and software have allowed improvement to the PA and CA models. Annual reviews of the PA and CA required by U.S. Department of Energy (DOE) Order DOE O 435.1 have documented multiple changes occurring since preparation of the PA and CA. Potentially important changes include: Development of a new and improved baseline PA and CA model implemented in the probabilistic GoldSim simulation platform. A significant increase in the waste inventory disposed at the site. Revision and updating of model parameters based on additional years of site monitoring data and new research and development results. Although changes have occurred, many important PA/CA issues remain unchanged, including the site conceptual model, important features, events, and processes, and the points of compliance. The SA is performed to document the current status of the PA/CA model and to quantitatively assess the impact of cumulative changes on the PA and CA results. The results of the SA are used to assess the validity of the approved PA/CA and make a determination if revision of the PA or CA is necessary. The SA was performed using the Area 3 RWMS, version 2.102, GoldSim model, the current baseline PA/CA model. Comparison of the maximum SA results with the PA performance objectives indicates that there continues to be a reasonable expectation of compliance. The resident exposure scenario was evaluated for compliance with the air pathway and all-pathways annual total effective dose (TED) performance objectives. The maximum mean air pathway TED, 7E-6 millisievert (mSv) at 1,000 years (y) has decreased relative to the approved PA and is significantly less than the 0.1 mSv limit. The maximum mean all-pathways annual TED, 7E-5 mSv at 1,000 y has increased but remains a small fraction of the 0.25 mSv limit. The SA maximum mean radon-222 (222Rn) flux density, 0.03 becquerel per square meter per second (Bq m-2 s-1), has increased relative to the PA results but is significantly less than the 0.74 Bq m-2 s-1 limit. The SA results continue to support a conclusion that the disposed waste inventory is protective of intruders and groundwater resources. The maximum mean intruder TED, 0.01 mSv for an acute construction scenario at the U-3ah/at disposal unit, was less than the 5 mSv performance measure. Site monitoring data and research results continue to support a conclusion that a groundwater pathway will not exist within the 1,000 y compliance period. Projected releases to the environment are a small fraction of the performance objectives. Cost-effective options for reducing releases further are unlikely to exist. Therefore, releases from the Area 3 RWMS are judged to be as low as reasonably achievable. Comparison of the maximum CA result with the 0.3 mSv CA dose constraint indicates that no action is required to reduce the dose from the Area 3 RWMS and all interacting sources of residual radioactive contamination. The SA maximum mean CA annual TED, 0.02 mSv at 1,000 y, has increased from the approved CA result but remains less than 10% of the dose constraint. The CA TED continues to be due predominantly to inhalation of plutonium-239 resuspended from soils contaminated by nuclear weapons tests conducted near the Area 3 RWMS. The SA results estimated with the Area 3 RWMS version 2.102 model indicate that changes to the PA and CA do not

  7. BA (Hons) Business Management (In-Company) Degree Information for Prospective Sponsoring Companies

    E-Print Network [OSTI]

    Evans, Paul

    BA (Hons) Business Management (In-Company) Degree Information for Prospective Sponsoring Companies) Business Management (In-Company) degree, which is based at Nottingham Business School, is aimed of the programme is full time at the Business School but students then spend the next two years in a company

  8. Cloud Computing as a Tool to Secure and Manage Information Flow in Swedish Armed Forces Networks.

    E-Print Network [OSTI]

    Ali, Muhammad

    2012-01-01T23:59:59.000Z

    ??In the last few years cloud computing has created much hype in the IT world. It has provided new strategies to cut down costs and (more)

  9. Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1,2

    E-Print Network [OSTI]

    Prasanna, Viktor K.

    , pricing, and demand among utility providers and consumers. While the smart meter infrastructure the events streaming from smart meters through the smart grid, to meaningful analysis and feedback for these decisions comes from diverse sources: smart meters that report near real-time power usage and quality

  10. Nevada National Security Site 2011 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2012-02-27T23:59:59.000Z

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2011 results. During 2011, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 8, August 2, August 24, and October 19, 2011; at UE5PW-2 on March 8, August 2, August 23, and October 19, 2011; and at UE5PW-3 on March 8, August 2, August 23, and October 19, 2011. Static water levels were measured at each of the three pilot wells on March 1, June 7, August 1, and October 17, 2011. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Initial total organic carbon and total organic halides results for samples collected in August 2011 were above previous measurements and, in some cases, above the established investigation limits. However, after field sample pumps and tubing were disinfected with Clorox solution, the results returned to normal levels. Final results from samples collected in 2011 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  11. UAV/UAS path planning for ice management information gathering.

    E-Print Network [OSTI]

    Stalmakou, Artsiom

    2011-01-01T23:59:59.000Z

    ??The key objective of this work is the proposition of the path planning strategy for unmanned aerial vehicle (UAV) intended for information gathering in Arctic (more)

  12. E-Print Network 3.0 - assessment information system Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The ISAAC system provides... 29.01.99.M1.26 Information Resources - Information Security Risk Assessment Reviews Page 1 of 3... which adequately provides management with assurance...

  13. International Journal of Information Security manuscript No. (will be inserted by the editor)

    E-Print Network [OSTI]

    Ding, Xuhua

    Ding 路 Yanjiang Yang 路 Robert H. Deng 路 Shuhong Wang A New Hardware-assisted PIR with O(n) Shuffle Cost information re- trieval (PIR) was first formalized by Chor et. al, various constructions have been proposed on practical PIR schemes. In this paper, we propose a hardware-assisted PIR scheme with a novel shuffle

  14. Secure Group-based Information Sharing in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Wang, Yu

    efforts such as joint intrusion detection. As an example, Phoenix Joint Terrorism Task Forces have information. Therefore, in an integrated ad hoc network, group-based data access must be controlled through. First, even with Elliptic Curve Cryptography, symmetric encryption still has its unique advantages

  15. FTCP Site Specific Information - Office of Environmental Management |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeat PumpRecord ofESPCofConstruction Management14,2DepartmentManagement |Department of

  16. Security and Use Control of Nuclear Explosives and Nuclear Weapons (Informational Purposes Only)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-02-24T23:59:59.000Z

    This draft has been scheduled for final review before the Directives Review Board on 3-5-15. All major comments and concerns should be provided to your DRB representative, following your organization process. If you do not know who your representative is, please see the list of DRB members at https://www.directives.doe.gov/beta/references/directives-review-board. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-1014). All major comments and concerns should be submitted by COB 3-3-15.

  17. Forms Management Guide for use with DOE O 200.1, Information Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-05-08T23:59:59.000Z

    Provides guidance for the development, analysis, approval, and management of forms in the U.S. Department of Energy (DOE). No cancellations.

  18. 2014 Internship Syllabus Page 1 of 4 MIS 353: Internship in Management Information Systems

    E-Print Network [OSTI]

    Ghosh, Joydeep

    2014 Internship Syllabus Page 1 of 4 MIS 353: Internship in Management Information Systems 2014 for reflection while you perform a professional internship that enhances your ability to achieve your career. Section 2. Contact Information Course website: http://www.mccombs.utexas.edu/BBA/Career-Services/Internship

  19. Current Regulations and Guidance - New Approaches for Risk-Informed Low-Level Radioactive Waste Management

    SciTech Connect (OSTI)

    Ryan, M.T. Ph.D.; CHP [Advisory Committee on Nuclear Waste and Materials, U.S. Nuclear Regulatory Commission, Washington, D.C. (United States)

    2008-07-01T23:59:59.000Z

    This paper presents the historical foundations and future challenges for commercial low-level radioactive waste (LLRW) management in the United States. LLRW has been managed at government facilities since the beginning of the nuclear age and in the commercial sector since the early 1960's. Over the intervening years many technical, management and regulatory changes have occurred. Significant progress has been made in waste form, waste packaging and in recognizing radionuclides important to performance of disposal technologies and disposal facilities. This presentation will examine approaches using existing regulations and risk-informed approaches to improve guidance, licensing and management of LLRW. (authors)

  20. Management of Dynamic Location Information O. Wolfson1,2,

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    DBMS. The database stores the information about each moving object, including its plan of motion-View GIS. It uses the Informix DBMS on Unix, and Oracle on MS/Windows. We will demonstrate the following

  1. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

  2. DATABASE SECURITY APPLICATIONS

    E-Print Network [OSTI]

    Sandhu, Ravi

    DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

  3. Managerial information behaviour: Relationships among Total Quality Management orientation, information use environments, and managerial roles

    E-Print Network [OSTI]

    Simard, C; Rice, Ronald E

    2006-01-01T23:59:59.000Z

    production process and customer information Low Total Quality Learning: continuous innovation and learning: exploration

  4. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  5. Information management fiscal year 1996 site support program plan, WBS 6.4. Revision 1

    SciTech Connect (OSTI)

    NONE

    1995-09-01T23:59:59.000Z

    In the recent past, information resource management (IRM) was a neatly separable component of the overall DOE mission, concerned primarily with procuring and implementing automatic data processing (ADP) systems. As the DOE missions have shifted from producing product to managing processes, those clear lines have blurred. Today, IRM is firmly embedded in all aspects of the DOE mission. BCS Richland, Inc., (BCSR) provides IRM for the Hanford Site. The main focus in executing this mission is to meet customer goals by providing high-quality, timely, and cost-effective electronic communication, computing, and information services. Information resources provide the US Department of Energy, Richland Operations Office (RL) and the Hanford Site contractors the ability to generate, store, access, and communicate information quickly, reliably, and cost effectively. BCSR plans, implements, and operates electronic communication, computing and information management systems that enable effective operation of the Hanford Site. Five strategic initiatives to encompass the vision provide guidance and focus to the information technology (IT) direction for developing the BCSR program plan. These strategic initiatives are the program vision and are as follows: primary focus; fast response; accessible information; world class information management infrastructure; powerful desktop. The business directions that guide the development of the BCSR Program Plan are: (1) emphasize providing cost-effective and value-added communication, computing, and information systems products and services to the Site missions; (2) strengthen the alignment of products and services with Site projects and programs and eliminate duplications Sitewide; (3) focus on the effective resolution of critical Site information management (IM) issues.

  6. Information basis for developing comprehensive waste management system-US-Japan joint nuclear energy action plan waste management working group phase I report.

    SciTech Connect (OSTI)

    Nutt, M.; Nuclear Engineering Division

    2010-05-25T23:59:59.000Z

    The activity of Phase I of the Waste Management Working Group under the United States - Japan Joint Nuclear Energy Action Plan started in 2007. The US-Japan JNEAP is a bilateral collaborative framework to support the global implementation of safe, secure, and sustainable, nuclear fuel cycles (referred to in this document as fuel cycles). The Waste Management Working Group was established by strong interest of both parties, which arise from the recognition that development and optimization of waste management and disposal system(s) are central issues of the present and future nuclear fuel cycles. This report summarizes the activity of the Waste Management Working Group that focused on consolidation of the existing technical basis between the U.S. and Japan and the joint development of a plan for future collaborative activities. Firstly, the political/regulatory frameworks related to nuclear fuel cycles in both countries were reviewed. The various advanced fuel cycle scenarios that have been considered in both countries were then surveyed and summarized. The working group established the working reference scenario for the future cooperative activity that corresponds to a fuel cycle scenario being considered both in Japan and the U.S. This working scenario involves transitioning from a once-through fuel cycle utilizing light water reactors to a one-pass uranium-plutonium fuel recycle in light water reactors to a combination of light water reactors and fast reactors with plutonium, uranium, and minor actinide recycle, ultimately concluding with multiple recycle passes primarily using fast reactors. Considering the scenario, current and future expected waste streams, treatment and inventory were discussed, and the relevant information was summarized. Second, the waste management/disposal system optimization was discussed. Repository system concepts were reviewed, repository design concepts for the various classifications of nuclear waste were summarized, and the factors to consider in repository design and optimization were then discussed. Japan is considering various alternatives and options for the geologic disposal facility and the framework for future analysis of repository concepts was discussed. Regarding the advanced waste and storage form development, waste form technologies developed in both countries were surveyed and compared. Potential collaboration areas and activities were next identified. Disposal system optimization processes and techniques were reviewed, and factors to consider in future repository design optimization activities were also discussed. Then the potential collaboration areas and activities related to the optimization problem were extracted.

  7. Property:ManagingFieldOffice | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County,ContAddr2 Jump to:ManagingFieldOffice Jump to: navigation, search

  8. INFORMATION: Special Report on "Management Challenges at the Department of Energy"

    SciTech Connect (OSTI)

    None

    2009-12-01T23:59:59.000Z

    Responsible for some of the Nation's most important and technically advanced missions, the Department of Energy faces an array of challenges that are more wide-ranging and complex than at any time in its history. While its origins can be largely traced to the Manhattan Project, the Department has evolved into a multi-faceted agency that encompasses a broad range of scientific, environmental, and national security activities. Since its creation under the Department of Energy Organization Act in 1977, the Department has shifted its emphasis and priorities over time as the energy and security needs of the Nation have changed. The Department has recently refocused these efforts, adding particular emphasis on the science and renewable energy components of its portfolio. In this regard, the Department has taken a lead role in the implementation and execution of the energy technology initiatives related to the American Recovery and Reinvestment Act of 2009 (Recovery Act). As a means of accomplishing these initiatives, the Department received a substantial increase in its annual appropriation, rising from nearly $25 billion in 2008 to approximately $34 billion in 2009 as a result of additional funding in the Department's loan program and numerous science, energy, and national security initiatives. In addition, the Department was provided more than $36 billion in Recovery Act funding to be used over a two to three year period. Further, the Department, through existing authorities and those expanded by the Recovery Act, has been authorized to provide more than $100 billion in loan guarantees for innovative, clean energy technologies. To accomplish its vital missions, the Department employs approximately 115,000 Federal and contractor personnel and manages assets valued at more than $189 billion, including the 17 national laboratories at the heart of its science program. On an annual basis, the Office of Inspector General is required to identify what it considers to be the most significant management challenges facing the Department. Our effort addresses new or emerging issues and evaluates the Department's progress in resolving previously identified challenges. The challenges identified by this process represent risks inherent in the Department's wide ranging and complex operations, as well as those related to problems with specific management processes. As noted in past reports, we recognize that often these challenges cannot be resolved in a single year and must, therefore, be addressed through a concentrated, persistent effort over time. Consistent with our mission, the overall goal is to focus attention on significant issues with the objective of working with Department managers to enhance the effectiveness of agency programs and operations. During the past year, the Department has taken a number of actions to promote its ongoing strategy of resolving the management challenges identified in our prior reports. There have been many notable advances. However, in our judgment, on the basis of the results of our work during the past year and other risk assement tools, the following management challenges remain for Fiscal Year (FY) 2010: Contract Administration; Cyber Security; Energy Supply; Environmental Cleanup; Safeguards and Security; and Stockpile Stewardship. As with a number of Federal agencies, the Department received an unprecedented infusion of funds as a result of the Recovery Act. These funds, along with the overarching goals set forth in the Act, were transformative in nature. On a positive note, the Department and its staff have been energized by the new and evolving programmatic initiatives resulting from the Recovery Act. However, as would be expected in an effort of this magnitude, the Departmnent has experienced significantly increased management stresses and strains, impacting virtually every program and operation. In fact, the essentially unavoidable burden placed on existing human capital and other resources has, in our judgment, affected the Department's ability to resolve its existing management challenges, a

  9. This extended abstract appeared in Proceedings of the 2006 ACM Symposium on Information, computer and communications security (AsiaCCS '06)

    E-Print Network [OSTI]

    Abdalla, Michel Ferreira

    , however, have resulted in site security policy changes. Many sites are changing their security policies

  10. IBM Information Management Software Services FileNet P8 3.x to 4.x Upgrade/Transition Services

    E-Print Network [OSTI]

    IBM Information Management Software Services FileNet P8 3.x to 4.x Upgrade/Transition Services adviser who understands your business needs and can successfully manage the transition. Information Management (IM) Lab Services is the experienced leader through which a successful ECM transition can

  11. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect (OSTI)

    None

    2009-10-01T23:59:59.000Z

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

  12. Preliminary Notice of Violation, National Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

  13. Preproposal Conference & Site Tour | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Preproposal Conference & Site Tour | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

  14. Infrastructure & Sustainability | National Nuclear Security Administra...

    National Nuclear Security Administration (NNSA)

    & Sustainability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  15. Best Practices for the Security of Radioactive Materials

    SciTech Connect (OSTI)

    Coulter, D.T.; Musolino, S.

    2009-05-01T23:59:59.000Z

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

  16. Incubator Management GmbH | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:PhotonHolyNameInformationsourceenhancedIncognito-Incubar

  17. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  18. A Toolkit for Constraint Management in Heterogeneous Information Systems \\Lambda

    E-Print Network [OSTI]

    Chawathe, Sudarshan S.

    to monitor and enforce distributed integrity constraints in loosely coupled heterogeneous information systems in such environments. Our framework is used to describe (1) interfaces provided by a database for the data items integrity constraints over data that is stored in a collec颅 tion of loosely coupled heterogeneous

  19. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  20. Ground Water Management District Rules | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to: navigation,Ohio:Greer County is a county inAl., 1979) |Haar,Management District Rules

  1. USAID-Forestry Conflict Management Training | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExplorationUT-gTagusparkCalculator Jump to: navigation, search ToolConflict Management

  2. Active Network Management (Smart Grid Project) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWaterBrasil Jump to: navigation, searchAccionaAcruxManagement (Smart

  3. Sustainable Groundwater Management Act of 2014 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty LtdSteen,Ltd Jump to: navigation, search Name: Sustainable EnergyManagement Act

  4. 2010 Annual Summary Report for the Area 3 and Area 5 Radioactive Management Sites at the Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2011-03-01T23:59:59.000Z

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 Radioactive Waste Management Site (RWMS) Performance Assessments (PAs) and Composite Analyses (CAs) in fiscal year (FY) 2010. This annual summary report presents data and conclusions from the FY 2010 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs.

  5. E-Print Network 3.0 - achieving cooperative security Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Collection: Chemistry ; Biotechnology 7 Secure Business Process Management: A Roadmap Thomas Neubauer, Markus Klemen, Stefan Biffl Summary: Secure Business Process...

  6. Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.3

    SciTech Connect (OSTI)

    Burford, M.J.; Burnett, R.A.; Downing, T.R. [and others

    1996-12-01T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the (Pacific Northwest National Laboratory) (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. 91 This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login, privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment.

  7. Research and information needs for management of oil shale development

    SciTech Connect (OSTI)

    Not Available

    1983-05-01T23:59:59.000Z

    This report presents information and analysis to assist BLM in clarifying oil shale research needs. It provides technical guidance on research needs in support of their regulatory responsibilities for onshore mineral activities involving oil shale. It provides an assessment of research needed to support the regulatory and managerial role of the BLM as well as others involved in the development of oil shale resources on public and Indian lands in the western United States.

  8. Montana Streamside Management Zone Law Webpage | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte3 Climate Zone Subtype A.InformationGuide Webpage Jump

  9. Idaho DEQ Waste Management and Permitting Webpage | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to: navigation,Ohio:GreerHiCalifornia:ISI Solar Jump to:InformationOpen|Tanks

  10. India-Natural Resource Management Plan | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpInc Place: Eden Prairie, Minnesota Zip: 55344

  11. Development of a Carbon Management Geographic Information System (GIS) for the United States

    SciTech Connect (OSTI)

    Howard Herzog; Holly Javedan

    2009-12-31T23:59:59.000Z

    In this project a Carbon Management Geographical Information System (GIS) for the US was developed. The GIS stored, integrated, and manipulated information relating to the components of carbon management systems. Additionally, the GIS was used to interpret and analyze the effect of developing these systems. This report documents the key deliverables from the project: (1) Carbon Management Geographical Information System (GIS) Documentation; (2) Stationary CO{sub 2} Source Database; (3) Regulatory Data for CCS in United States; (4) CO{sub 2} Capture Cost Estimation; (5) CO{sub 2} Storage Capacity Tools; (6) CO{sub 2} Injection Cost Modeling; (7) CO{sub 2} Pipeline Transport Cost Estimation; (8) CO{sub 2} Source-Sink Matching Algorithm; and (9) CO{sub 2} Pipeline Transport and Cost Model.

  12. Web-based feedback system: the life cycle management as continuous maintenance of apartment facility information

    E-Print Network [OSTI]

    Jeong, Jin Su

    2006-10-30T23:59:59.000Z

    to make it efficient. A database requires a database management system (DBMS), a set of computer programs for organizing the information in a database, to manage its structure and control access to the data stored in the database [9]. A DBMS supports... the structuring of the database in a standard format and provides tools for data input, verification, storage, retrieval, query, and manipulation. According to Ramakishman [26], DBMS is software, designed to assist in maintaining and utilizing large collection...

  13. Contacts for Information Collection Management | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User GroupInformationE-Gov Contacts for E-Gov LeAnnProject

  14. Macquarie Funds Management USA Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpIncMAKGalway Bay IEOWCCatcher.pngWavemill <MNMabank,form View

  15. INFORMATION ON THE SYSTEM FOR AWARD MANAGEMENT (SAM)

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietip sheetK-4InFinding InvestigationofINFORMATION ON THE SYSTEM FOR

  16. Information and Records Management Transition Guidance | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomentheATLANTA,Fermi NationalBusiness PlanPosting Thomas F.NeedsEnergy Information

  17. Utah Nonpoint Source Pollution Management Plan | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformation UC 19-6-401Upson County,MonkeymosaicCommerce JumpTank

  18. NA IM- Associate Administrator for Information Management & Chief

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of the Yucca0 NationalJ Page i|Information Officer |

  19. National Forest Management Act of 1976 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's HeatMexico: EnergyMithun JumpMuscoy,Jump9 CaseNatEl Jump to:NCPVNational

  20. Network-Driven Demand Side Management Website | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's HeatMexico: EnergyMithunCenter Jump to:2 Rules,NellisAntilles:

  1. New England Energy Management Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's HeatMexico: EnergyMithunCenter Jump to:2 JumpCanaan,Ecology Jump to: Name:Inc

  2. ADEQ Hazardous Waste Management website | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights,Information Of TheFixed Logo: ACORE Name:Forms

  3. ADEQ Managing Hazardous Waste Handbook | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights,Information Of TheFixed Logo: ACORE

  4. ASM Asset Management DTVM SA | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights,InformationWind EnergyPublic UtilitiesTechnology

  5. Hara Environmental and Energy Management Solution | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:Photon Place:Net JumpStrategy |Hammerfest Strom UKHara

  6. KlimaINVEST Management GmbH | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpInc Place:Keystone Clean Air Jump to:KingKirkwood

  7. Secure Multiparty Computation Based Privacy Preserving Smart Metering System

    E-Print Network [OSTI]

    Franchetti, Franz

    Secure Multiparty Computation Based Privacy Preserving Smart Metering System Cory Thoma Information Ave. Pittsburgh, PA 15213 Email: {tcui,franzf}@ece.cmu.edu Abstract--Smart metering systems provide privacy preserving protocol for smart meter based load management. Using SMC and a proper designed

  8. Addendum to CSUIT Security Policy Warner College of Natural Resources

    E-Print Network [OSTI]

    Addendum to CSUIT Security Policy for Warner College of Natural Resources Version 1.06 - July 2010 information technologies, as well as a growing need to protect the computing resources at Colorado State unique cases will be dealt with on a case by case basis by the College of Natural Resources IT Manager

  9. Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.2

    SciTech Connect (OSTI)

    Burford, M.J.; Burnett, R.A.; Curtis, L.M. [and others

    1996-05-01T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS system package. System administrators, database administrators, and general users can use this guide to install, configure, and maintain the FEMIS client software package. This document provides a description of the FEMIS environment; distribution media; data, communications, and electronic mail servers; user workstations; and system management.

  10. Collaboration, Automation, and Information Management at Hanford High Level Radioactive Waste (HLW) Tank Farms

    SciTech Connect (OSTI)

    Aurah, Mirwaise Y.; Roberts, Mark A.

    2013-12-12T23:59:59.000Z

    Washington River Protection Solutions (WRPS), operator of High Level Radioactive Waste (HLW) Tank Farms at the Hanford Site, is taking an over 20-year leap in technology, replacing systems that were monitored with clipboards and obsolete computer systems, as well as solving major operations and maintenance hurdles in the area of process automation and information management. While WRPS is fully compliant with procedures and regulations, the current systems are not integrated and do not share data efficiently, hampering how information is obtained and managed.

  11. 2015 DOE Safety and Security Enforcement Workshop - Badging and...

    Office of Environmental Management (EM)

    2015 DOE Safety and Security Enforcement Workshop - Badging and Facility Information 2015 DOE Safety and Security Enforcement Workshop - Badging and Facility Information January...

  12. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect (OSTI)

    Lee, Hsien-Hsin S

    2010-05-11T23:59:59.000Z

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  13. Radioactive Waste Management information for 1994 and record-to-date

    SciTech Connect (OSTI)

    French, D.L.; Lisee, D.J.; Taylor, K.A.

    1995-07-01T23:59:59.000Z

    This document, Radioactive Waste Management Information for 1994 and Record-To-Date, contains computerized radioactive waste data records from the Idaho National Engineering Laboratory (INEL). Data are compiled from information supplied by the US Department of Energy (DOE) contractors. Data listed are on airborne and liquid radioactive effluents and solid radioactive waste that is stored, disposed, and sent to the INEL for reduction. Data are summarized for the years 1952 through 1993. Data are detailed for the calendar year 1994.

  14. Finders/keepers: A longitudinal study of people managing information scraps in a micro-note tool

    E-Print Network [OSTI]

    Van Kleek, Max G.

    Mainstream PIM tools capture only a portion of the information that people need to manage. Many information scraps seem to exist that don't make their way into these tools, instead being relegated to sticky notes, text ...

  15. Migrating the facility profile information management system into the world wide web

    SciTech Connect (OSTI)

    Kero, R.E.; Swietlik, C.E.

    1994-09-01T23:59:59.000Z

    The Department of Energy - Office of Special Projects and Argonne National Laboratory (ANL), along with the Department of Energy - office of Scientific and Technical Information have previously designed and implemented the Environment, Safety and Health Facility Profile Information Management System (FPIMS) to facilitate greater efficiency in searching, analyzing and disseminating information found within environment, safety and health oversight documents. This information retrieval based system serves as a central repository for full-text electronic oversight documents, as well as a management planning and decision making tool that can assist in trend and root cause analyses. Continuous improvement of environment, safety and health programs are currently aided through this personal computer-based system by providing a means for the open communication of lessons learned across the department. Overall benefits have included reductions in costs and improvements in past information management capabilities. Access to the FPIMS has been possible historically through a headquarters-based local area network equipped with modems. Continued demand for greater accessibility of the system by remote DOE field offices and sites, in conjunction with the Secretary of Energy` s call for greater public accessibility to Department of Energy (DOE) information resources, has been the impetus to expand access through the use of Internet technologies. Therefore, the following paper will discuss reasons for migrating the FPIMS system into the World Wide Web (Web), various lessons learned from the FPIMS migration effort, as well as future plans for enhancing the Web-based FPIMS.

  16. Participative management in the elaboration and implementation of the OSUA information system

    E-Print Network [OSTI]

    Paris-Sud XI, Universit茅 de

    , the association has chosen to rely on an internationally recognized reference : ISO 9001: 2000. This reference1 Participative management in the elaboration and implementation of the OSUA information system and implementation of a monitoring system for mentally disabled users' pathways at all ages and in all situations

  17. Idaho National Engineering Laboratory Nonradiological Waste Management Information for 1992 and record to date

    SciTech Connect (OSTI)

    Randall, V.C.; Sims, A.M.

    1993-08-01T23:59:59.000Z

    This document provides detailed data and graphics on airborne and liquid effluent releases, fuel oil and coal consumption, water usage, and hazardous and mixed waste generated for calendar year 1992. This report summarizes industrial waste data records compiled since 1971 for the Idaho National Engineering Laboratory (INEL). The data presented are from the INEL Nonradiological Waste Management Information System.

  18. Project Information Form Project Title Integrating Management of Truck and Rail Systems in Los Angeles

    E-Print Network [OSTI]

    California at Davis, University of

    Project Information Form Project Title Integrating Management of Truck and Rail Systems in Los or organization) Volvo Research and Educational Foundation- $79,604.00 Total Project Cost $79,604.00 Agency ID of Research Project This project will develop models to optimize the balance of freight demand across rail

  19. Project Information Form Project Title Advanced Energy Management Strategy Development for Plug-in Hybrid

    E-Print Network [OSTI]

    California at Davis, University of

    ,365 Total Project Cost $58,365 Agency ID or Contract Number DTRT13-G-UTC29 Start and End Dates April 1, 2014Project Information Form Project Title Advanced Energy Management Strategy Development for Plug 颅 September 30, 2015 Brief Description of Research Project Plug-in hybrid vehicles (PHEVs) have great

  20. Project Information Form Project Title Managing Roadway Systems to Reduce GHG Emissions and Improve

    E-Print Network [OSTI]

    California at Davis, University of

    or organization) $25,217 Total Project Cost $25,217 Agency ID or Contract Number DTRT13-G-UTC29 Start and EndProject Information Form Project Title Managing Roadway Systems to Reduce GHG Emissions and Improve Dates 4/1/14 颅 3/30/15 Brief Description of Research Project There have been a variety of traffic