Powered by Deep Web Technologies
Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Office of Environmental Management (EM)

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

2

Enterprise Information Security Management Framework [EISMF  

E-Print Network [OSTI]

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

3

RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS  

E-Print Network [OSTI]

organizational managers in making informed decisions regarding the security of their information systems. NIST agencies implementing risk-based planning and management also must consider effectiveness, efficiency for their information and information systems with the gains in capabilities and improved support of organizational

4

The Relationship Between Information Security and Fraud Risk Management  

E-Print Network [OSTI]

of Regional Security & Fraud Risk HSBC THE CHINESE UNIVERSITY OF HONG KONG Department of Information current role in HSBC, as the Head of Regional Security & Fraud for Asia Pacific involves financial crime

Huang, Jianwei

5

MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY  

E-Print Network [OSTI]

a well-defined process for managing and controlling secure system configurations, and for managing risks, and the integration of security into the configuration management process throughout the life cycle of the system for establishing secure configurations in information systems; flow charts for SecCM processes and activities

6

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

7

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation抯 security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

8

Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1  

E-Print Network [OSTI]

Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1 THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li in the economic incentives inherent in providing the defenses as well as uncertainty in current defenses. We

Sadeh, Norman M.

9

Implementing Information Security and Its Technology: A LineManagement Perspective  

SciTech Connect (OSTI)

Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

Barletta, William A.

2005-08-22T23:59:59.000Z

10

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation抯 security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

11

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect (OSTI)

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

12

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

13

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

14

Data Sciences Technology for Homeland Security Information Management  

E-Print Network [OSTI]

. Samatova, D. Speck, R. Srikant, J. Thomas, M. Wertheimer, P. C. Wong SANDIA REPORT SAND2004-6648 Unlimited Report of the DHS Workshop on Data Sciences September 22-23, 2004 Jointly released by Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

Kolda, Tamara G.

15

V-192: Symantec Security Information Manager Input Validation...  

Broader source: Energy.gov (indexed) [DOE]

Input Validation Flaws U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks T-731:Symantec IM Manager Code Injection Vulnerability...

16

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002OpticsPeriodical: VolumeIComplaints - GoldenDepartment of

17

Quantifying and managing the risk of information security breaches participants in a supply chain  

E-Print Network [OSTI]

Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

Bellefeuille, Cynthia Lynn

2005-01-01T23:59:59.000Z

18

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

19

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

20

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

22

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

23

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

24

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

25

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

26

Information Resources Security Planning and Policy Committee -UTDPP1003  

E-Print Network [OSTI]

Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security Planning and Policy Committee Policy Statement The Information Resources Planning, and Policy a security plan to protect information identified as confidential, sensitive or both. 3. Assign management

O'Toole, Alice J.

27

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

28

Information Technology and Management Department of Information Technology and Management  

E-Print Network [OSTI]

Information Technology and Management Department of Information Technology and Management Daniel F Chicago, IL 60616 appliedtech.iit.edu/information-technology-and- management Dean and Chair: C. Robert in the information technology and cyber security fields. The Information Technology and Management degrees apply

Heller, Barbara

29

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

30

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. 路 Access control system implements Information Security Group Agenda 路 Access control basics 路 ACLs and capabilities 路 Information flow policies路 Information flow policies 路 Bell-LaPadula Model 路 Role-Based Access Control 路 Resources 3 Information Security

Mitchell, Chris

31

AT&TSecurity Consulting Information Assurance Federal Information Security  

E-Print Network [OSTI]

the security controls for the information system. The AT&T Consulting methodology is based on National in addressing industry best practices and provide Security Authorization Process, formerly Certification requirements under the Federal Information Security Management Act of 2002, of general support systems

Fisher, Kathleen

32

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

33

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

34

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

35

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Sel莽uk

36

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

37

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

38

Information Resources Security Planning and Policy Committee -UTDPP1003  

E-Print Network [OSTI]

Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security it is confidential, sensitive, both or neither. 2. Prepare a security plan to protect information identified as confidential, sensitive or both. 3. Assign management responsibility for implementing the security plan. 4

O'Toole, Alice J.

39

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

40

Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers  

E-Print Network [OSTI]

The importance of safeguarding information created and shared on computers and the Internet has increased significantly in recent years, as society has become increasingly dependent on information technology in government, ...

Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

2009-01-05T23:59:59.000Z

42

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

43

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

44

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network [OSTI]

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

45

Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr.  

E-Print Network [OSTI]

, military, process control . K.6.5 [Management Of Computing And Information Systems]: Security/server, distributed applications, distributed databases. J.7 [Computers In Other Systems]: Command and control security, unauthorized access. General Terms Management, Design, Security. Keywords Access Control

Lee, Ruby B.

46

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

47

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

48

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

49

Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY  

E-Print Network [OSTI]

Code of Practice for Information Security Management (ISO/IEC 27002:2005) The international standard Electrotechnical Commission (IEC) A global organization that develops and publishes standards, the private sector, consumer groups, professional associations, and others. International Organization

50

Delegating Network Security with More Information  

E-Print Network [OSTI]

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

Naous, Jad

51

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

52

Integrated safeguards and security management plan  

SciTech Connect (OSTI)

Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

Bowen, Sue, editor

2001-04-16T23:59:59.000Z

53

Integrated Safeguards and Security Management (ISSM) Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

2001-05-08T23:59:59.000Z

54

Third Annual Cyber Security and Information  

E-Print Network [OSTI]

Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

Krings, Axel W.

55

Building an Information Technology Security Awareness  

E-Print Network [OSTI]

Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

56

Security Analysis and Project Management Systems | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

57

T-614: Cisco Unified Communications Manager Database Security...  

Energy Savers [EERE]

614: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis...

58

Safeguards and Security Program Planning and Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes program planning and management requirements for the Departments Safeguards and Security (S&S) Program. Cancels: DOE N 473.9 and DOE M 470.1-1

2005-08-26T23:59:59.000Z

59

Safeguards and Security Program Planning and Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes program planning and management requirements for the Departments Safeguards and Security. Chg 1, dated 3-7-06 Cancels DOE N 473.9, DOE M 470.1-1 Chg 2.

2005-08-26T23:59:59.000Z

60

Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop  

SciTech Connect (OSTI)

The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Information Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for planningtoA JourneyISTI Information Science

62

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

63

MSc and Postgraduate Diploma in Information Security  

E-Print Network [OSTI]

of information security need internationally-recognised qualifications which How will the course help my career and understanding of What do employers say? Worldwide Access | Opportunity | International Standards qualifications. #12;`Attending my first Information Security supplier event after graduating made me reali

Royal Holloway, University of London

64

Safeguards and Security Program and Project Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The proposed revision to this Department of Energy Guide focuses on alignment of guidance for implementing key safeguard and security components to the DOE capital asset acquisition process with the revised DOE O 413.3B, Program and Project Management for Acquisition of Capital Assets, the revised DOE O 470.4B, Safeguard and Security Program, and the new series of DOE Orders replacing the DOE M 470.4 series of manuals.

2013-04-18T23:59:59.000Z

65

Information Technology Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Cancels DOE O 200.1.

2008-12-23T23:59:59.000Z

66

Classified Automated Information System Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

1994-07-15T23:59:59.000Z

67

Finance, IT Operations& InformationSecurity Dear Colleagues,  

E-Print Network [OSTI]

-examine collectively the customer service aspect of our grant and contract management. A dozen SEAS members, including, is Information Technology. While Indir has stepped into the role of Interim IT Director to keep the proverbial and to check out interesting tips about securing mobile devices and avoiding phishing scams. Harry Dumay, Ph

68

Find It. Delete It. Protect It. Information Technology Security Strategy  

E-Print Network [OSTI]

that security will be a process rather than project. Achievement of the goal, optimized risk management to external best practices and seek external advice on effectiveness. For critical processes and systems valuable information for governance. This process will achieve the long term Internal Controls Maturity

Sheridan, Jennifer

69

U-200: Red Hat Directory Server Information Disclosure Security...  

Broader source: Energy.gov (indexed) [DOE]

0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

70

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

71

Integrated Safeguards and Security Management Self-Assessment 2004  

SciTech Connect (OSTI)

In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

Lunford, Dan; Ramsey, Dwayne

2005-04-01T23:59:59.000Z

72

Safeguards and Security Program Planning and Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes program planning and management requirements for the Department抯 Safeguards and Security (S&S) Program. Change 2 is a revision to Section M of both the Manual and the CRD to realign the process for establishing deviations from DOE directives containing safeguards and security requirements to reflect established Departmental policy as set forth in DOE O 251.1C. Original publication, 8-26-05; Chg 1, 3-7-06. Canceled by DOE O 470.4B

2005-08-26T23:59:59.000Z

73

Information Collection Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

2006-10-11T23:59:59.000Z

74

Smart Grid Information Security (IS) Functional Requirement  

E-Print Network [OSTI]

It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entire grid. The background of smart information infrastructure and the needs for smart grid IS is described with the adoption of hermeneutic circle as methodology. Grid information technology and security-s session discusses that grid provides the chance of a simple and transparent access to different information sources. In addition, the transformation between traditional versus smart grid networking trend and the IS importance on the communication field reflects the criticality of grid IS functional requirement identification is introduces. The smart grid IS functional requirements described in this paper are general and ...

Ling, Amy Poh Ai

2011-01-01T23:59:59.000Z

75

Certification and Accreditation Process for Information Systems Including National Security Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

2004-02-19T23:59:59.000Z

76

Information & Records Management Process Manual  

E-Print Network [OSTI]

several significant failures to manage information in the public sector in New Zealand, which the Official Information, Privacy, Copyright and Public Records Acts. How you manage UC informationInformation & Records Management Process Manual 2013Information and Records Management #12;Contents

Hickman, Mark

77

Classified Information Systems Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

1999-08-03T23:59:59.000Z

78

Principles of Secure Information Flow Analysis Geoffrey Smith  

E-Print Network [OSTI]

Principles of Secure Information Flow Analysis Geoffrey Smith School of Computing and Information to explain the #12;2 Geoffrey Smith principles underlying secure information flow analysis and to discuss

Smith, Geoffrey

79

Finance, IT Operations & Information Security Dear Colleagues,  

E-Print Network [OSTI]

1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful with the guidance of their senior administrators. The re-organization in some of the finance offices continues the intranet site. #12;2 Harry Dumay, PhD MBA Chief Financial Officer/ Associate Dean for Finance

80

Optimal Information Security Investment with Penetration Testing  

E-Print Network [OSTI]

gathering prior to investing into protection against so-identified threats. Penetration testing is alsoOptimal Information Security Investment with Penetration Testing Rainer B篓ohme and M麓ark F麓elegyh麓azi International Computer Science Institute, Berkeley, California {rainer.boehme|mark}@icsi.berkeley.edu Abstract

Bencs谩th, Boldizs谩r

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

PRIVACY AND SECURITY OF PERSONAL INFORMATION  

E-Print Network [OSTI]

Chapter 1 PRIVACY AND SECURITY OF PERSONAL INFORMATION Economic Incentives and Technological for many, the economic #12;2 incentives have not generated widespread adoption, and government in University acquisti@andrew.cmu.edu Abstract I discuss the evolution of the economic analysis of privacy

Sadeh, Norman M.

82

Information Security Plan for Flight Simulator Applications  

E-Print Network [OSTI]

The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. We will be creating a system that will allow them to access their programs, back office and administrator functions remotely. A security plan outlining our security architecture will be delivered prior to the final code roll out. The plan will include responses to encryption used and the security architecture applied in the final documentation. The code will be delivered in phases to work out any issues that may occur during the implementation

Slaughter, Jason

2011-01-01T23:59:59.000Z

83

Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security  

E-Print Network [OSTI]

Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

Kim, Kwangjo

84

Improving web site security with data flow management  

E-Print Network [OSTI]

This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or ...

Yip, Alexander Siumann, 1979-

2009-01-01T23:59:59.000Z

85

Ontological Mapping of Information Security Best-Practice Guidelines  

E-Print Network [OSTI]

best-practice guidelines, security ontology, EBIOS, IT Grundschutz Manual. 1 Introduction In recent- schutz Manual [4] to the security ontology by [6]. 2 Ontological Mapping of Information Security Best-PracticeOntological Mapping of Information Security Best-Practice Guidelines Stefan Fenz, Thomas Pruckner

86

Information Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides a framework for managing information, information resources, and information technology investment, which supports the operating elements of the Department in the accomplishment of its missions and functions in both an efficient and effective manner and in accordance with Departmental policy. Cancels: DOE 1324.5B, DOE 5900.1A, DOE 1130.8A, DOE 1330.1D, DOE 1410.2, DOE 1450.3A, DOE 1700.1, DOE 1800.1A, DOE 5300.1C

1996-09-30T23:59:59.000Z

87

acquisition management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational NuclearhasAdministration goSecurity Administrationmanagement |

88

National Interest Security Company NISC Formerly Technology Management...  

Open Energy Info (EERE)

search Name: National Interest Security Company (NISC) (Formerly Technology & Management Services (TMS) Inc.) Place: Gaithersburg, Maryland Zip: 20879 Product: TMS provides...

89

Los Alamos National Security LLC Selected to Manage Los Alamos...  

Energy Savers [EERE]

be the management and operations contractor for Los Alamos National Laboratory in New Mexico. Los Alamos National Security LLC is a limited liability corporation made up of...

90

Information Technology and Management Information Technology and Management  

E-Print Network [OSTI]

Information Technology and Management Information Technology and Management IIT School of Applied Technology Daniel F. and Ada L. Rice Campus 201 E. Loop Road Wheaton, IL 60187 www.iit.edu/applied tech/ Dean Technology & Management program is to educate and inform students to prepare them to assume technical

Heller, Barbara

91

Security Certification & Accreditation of Federal Information Systems A Tutorial  

E-Print Network [OSTI]

assessments of Security Controls in Information Systems To obtain better understanding of Agency- related to hardware, software, firmware) Security Controls in an Information System, to determine the extent to which/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Questions during C&A Process

Madisetti, Vijay K.

92

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Squicciarini, Anna Cinzia

93

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Giles, C. Lee

94

Information Technology Security Training Requirements Appendix A --Learning Continuum A-1  

E-Print Network [OSTI]

employees Security Awareness All employees involved with IT systems Security Basics and Literacy Information control. By accrediting a system or application, a manager accepts the associated risk. Accreditation, and Installation Controls -- the process of assuring that adequate controls are considered, evaluated, selected

95

LEGACY MANAGEMENT REQUIRES INFORMATION  

SciTech Connect (OSTI)

''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

CONNELL, C.W.; HILDEBRAND, R.D.

2006-12-14T23:59:59.000Z

96

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

2010- 2011 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS Relevance and currency -- that is what drives the Aviation Safety and Security Program of the USC Viterbi that our core course, Aviation Safety Management Systems, is so necessary in ensuring the safety

Wang, Hai

97

CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection...  

Broader source: Energy.gov (indexed) [DOE]

(Lead) Christina "Chris" Rouleau Phone: 301-903-6227 Email: Christina.Rouleau@hq.doe.gov Information Collection Management Program (Lead) Deidra "Dee Dee" Wilkinson Phone:...

98

Information resource management concepts for records managers  

SciTech Connect (OSTI)

Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management`s goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

Seesing, P.R.

1992-10-01T23:59:59.000Z

99

Information resource management concepts for records managers  

SciTech Connect (OSTI)

Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management's goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

Seesing, P.R.

1992-10-01T23:59:59.000Z

100

Information Security Framework for Small and Medium Sized Businesses  

E-Print Network [OSTI]

prevalent risks to business information and commonly exploited security holes can quickly close the door to a security incident. Just as with traditional burglary attempts, the computer criminals will first look for the path of least resistance when trying...

Michnick, Steven M.

2009-06-17T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Modern Quantum Technologies of Information Security  

E-Print Network [OSTI]

In the paper systematization and classification of modern quantum technologies of the information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of used quantum technologies is given. The qualitative analysis of advantages and disadvantages of concrete quantum protocols is made. The current status of a problem of practical quantum cryptography using in telecommunication networks is considered. In particular, the short review of existing commercial systems of quantum key distribution is given.

Korchenko, Oleksandr; Gnatyuk, Sergiy

2010-01-01T23:59:59.000Z

102

Site Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclearhas 'Natitude'SecurityAdministration rankedInformation | National

103

Scientific and Technical Information Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements and responsibilities for managing DOE's scientific and technical information. Cancels DOE O 241.1. Canceled by DOE O 241.1B.

2003-10-14T23:59:59.000Z

104

Group Security Association (GSA) Management in IP Multicast  

E-Print Network [OSTI]

Abstract: This work describes the Group Security Association (GSA) Management model and protocol as developed in the Secure Multicast Group (SMuG) in the IETF. The background reasoning from the Internet Key Exchange (IKE) protocol perspective is explained, together with the notion of Security Associations (SA) in the unicast case. This serves as a basis for a requirements for Group SA for multicast. Finally, the definition and construction of a GSA is described. 1.

Thomas Hardjono; Mark Baugher; Hugh Harney

105

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

2011- 2012 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS of aviation safety. Endings signal new beginnings and new beginnings mean evolving challenges for safety. This was the world in which the USC Aviation Safety and Security Program was born in 1952 and this is the world

Wang, Hai

106

Secure Streaming Media and Digital Rights Management Deepali Holankar  

E-Print Network [OSTI]

Secure Streaming Media and Digital Rights Management Deepali Holankar Department of Computer of our secure streaming media system and we give some performance results. 1 #12;2 Digital rights. Company A only wants to allow paying customers to have access to the media stream. Digital rights

Stamp, Mark

107

Safeguards and Security for Program and Project Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides approaches for implementing security provisions within the functional areas contained in DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets. Canceled by DOE G 413.3-3A.

2007-11-15T23:59:59.000Z

108

NNSA Selects Consolidated Nuclear Security, LLC to Manage the...  

National Nuclear Security Administration (NNSA)

to be the management and operating contractor for the Y-12 National Security Complex in Oak Ridge, Tenn., and the Pantex Plant near Amarillo, Texas. The contract also includes...

109

The Department of Homeland Security Energy Management Program  

Energy Savers [EERE]

Security Energy Management Program May 2, 2007 DHS Energy Program Overview Steven W. White, CEM May 2, 2007 2 Policy "It is the policy of the United States that Federal agencies...

110

Security and Emergency Management Independent Oversight and Performance Assurance Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes the DOE Security and Emergency Management Independent Oversight and Performance Assurance Program. Cancels DOE O 470.2, Paragraph 5b(2) of DOE O 231.1 and Chapter IV of DOE M 231.1-1.

2000-03-01T23:59:59.000Z

111

Selection of Model in Developing Information Security Criteria for Smart Grid Security System  

E-Print Network [OSTI]

At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

Ling, Amy Poh Ai

2011-01-01T23:59:59.000Z

112

Information Technology Project Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

2012-12-03T23:59:59.000Z

113

Information Technology Project Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

2012-12-03T23:59:59.000Z

114

Information Technology Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This revised Order is needed to clarify the roles and responsibilities, policies, and procedures for effectively managing IT investments to ensure mission success.

2013-11-21T23:59:59.000Z

115

Cyber Security Requirements for Wireless Devices and Information Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

116

Training for Records and Information Management  

Broader source: Energy.gov [DOE]

Records Management Training: NARA Records Management Training牋 NARA Targeted Assistance NARA Brochures Training Presentation: Information Collection Requests/PRA (pdf)

117

Consequence Management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

118

Information Management and Supporting Documentation  

Broader source: Energy.gov [DOE]

The Paperwork Reduction Act (PRA) of 1995 requires each Federal agency to seek and obtain approval from the Office of Management and Budget (OMB) before undertaking a collection of information...

119

Energy Management and Information Systems  

E-Print Network [OSTI]

?infrastructure energy?audits,?HVAC?upgrades,? heat?recovery,?etc. Improve?operations processes?and?day?to?day? operations,?retro? commissioning ENERGY?MANAGEMENT?INFORMATION?SYSTEM the?project Hardware ? $3.0?million?investment ? 400+?meters...

Conraud, J.

2013-01-01T23:59:59.000Z

120

Records and Information Management Transition Guidance (November...  

Broader source: Energy.gov (indexed) [DOE]

Records and Information Management Transition Guidance (November 2013) Records and Information Management Transition Guidance (November 2013) This guidance document establishes a...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Monitoring informs management  

SciTech Connect (OSTI)

Improved regional monitoring and reporting of greenhouse-gas emissions depends on accurate estimates of emissions from different land-use regimes. An analysis suggests that measuring emissions per crop yield may be an optimum metric for refining land-management decisions.

West, Tristram O.

2011-10-24T23:59:59.000Z

122

Int. J. Information and Computer Security, Vol. 4, No. 4, 2011 365 Copyright 2011 Inderscience Enterprises Ltd.  

E-Print Network [OSTI]

one of the business process security leitmotifs. It defines a mechanism that bridges the gap between workflow and access control systems. Delegation completion and authorisation enforcement are specified in workflow management systems', Int. J. Information and Computer Security, Vol. 4, No. 4, pp.365

Paris-Sud XI, Universit de

123

INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO  

E-Print Network [OSTI]

management procedures that are applied through out the System Development Life Cycle (SDLC). This same

124

project management | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions3 weProject

125

Securely Managing Cryptographic Keys used within a Cloud Environment  

E-Print Network [OSTI]

, Co-tenancy, Distributed Management Cryptography essential to secure cloud operations Use of sound;Page 3 Cloud Service Provider (CSP) - Models Cloud Service Models Software as a Service (Saa CSP know who I am? How is my connection to cloud components protected? Administration Who

126

CAN INTEGRATED WATERSHED MANAGEMENT BRING GREATER FOOD SECURITY IN ETHIOPIA?  

E-Print Network [OSTI]

CAN INTEGRATED WATERSHED MANAGEMENT BRING GREATER FOOD SECURITY IN ETHIOPIA? Oloro V. McHugh, Amy S, Ethiopia Gete Zeleke ARARI, Bahir Dar, Ethiopia Abstract: In the food insecure regions, short annual. Ethiopia's agricultural sector is driven by the subsistence strategies of smallholder farmers

Walter, M.Todd

127

TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop  

E-Print Network [OSTI]

security 1. PROBLEM STATEMENT Software engineers used standard software engineering processes to develop of software are annoying, but delays of an hour are not catastrophic. But in certain environments (notably to use techniques, and--more importantly--how to analyze social, political, and cultural environments

128

TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop  

E-Print Network [OSTI]

security 1. PROBLEM S A EMEN Software engineers used standard software engineering processes to develop and scenarios drawn from political science, history, and other humanities to force students to apply or derive the process enjoyable, stimulating, and effective. Key words: environment, judgment, instruction, computer

Bishop, Matt

129

Program Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

and Operating (M&O) Contract Competition Program Information Program Information FY 2015 Performance Evaluation Plan (PEP) FY 2013 Performance Evaluation Report (PER)...

130

Manual of Security Requirements for the Classified Automated Information System Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

1994-07-15T23:59:59.000Z

131

Information Flow for Secure Distributed Applications  

E-Print Network [OSTI]

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-08-27T23:59:59.000Z

132

Information flow for secure distributed applications  

E-Print Network [OSTI]

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-01-01T23:59:59.000Z

133

Vendor Information | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500IIVasudha Patri MechanicalofVehicles - ORNL

134

Page 10, Security Forms and Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Para9EnvironmentalPage of 1 pages1 of

135

Consequence Management | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User Group andCompositional Account InformationConquering4Consequence

136

ORISE: National Security and Emergency Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Regionat CornellInternships, Scholarships and Fellowships ORISE CSEPP

137

Information Collection Management | Department of Energy  

Office of Environmental Management (EM)

Information Collection RequestsPRA (PDF) DOE Order 200.2 Information Collection Management Program - To set forth the Department of Energy (DOE) requirements and...

138

TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27  

E-Print Network [OSTI]

TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27.01.04 PROCEDURE STATEMENT This procedure establishes information resources security and management guidelines for all Texas Veterinary Medical Diagnostic Laboratory (TVMDL) positions. Reason for Procedure Under

139

Information Security Analysis Using Game Theory and Simulation  

SciTech Connect (OSTI)

Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

Schlicher, Bob G [ORNL] [ORNL; Abercrombie, Robert K [ORNL] [ORNL

2012-01-01T23:59:59.000Z

140

Information Systems Management (ISM) 2011 Department of Supply Chain & Information Systems  

E-Print Network [OSTI]

Information Systems Management (ISM) 2011 Department of Supply Chain & Information Systems Information Systems Management Minor Application Overview The Information Systems Management focuses Systems Management and Applications c. MIS 431 (3) Business Data Management d. MIS 446 (3) Information

Yener, Aylin

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

2004-02-19T23:59:59.000Z

142

Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Cancels DOE 5639.8.

1993-07-23T23:59:59.000Z

143

Roadmap: Computer Science Information Security -Bachelor of Science  

E-Print Network [OSTI]

Roadmap: Computer Science 颅 Information Security -Bachelor of Science [AS-BS-CS-INSE] College of Arts and Sciences Department of Computer Science Catalog Year: 2012颅2013 Page 1 of 2 | Last Updated: 3 Major GPA Important Notes Semester One: [16 Credit Hours] CS 13001 Computer Science I: Programming

Sheridan, Scott

144

Office of the CISO, December 2010 Information Security Risk Advisory  

E-Print Network [OSTI]

Office of the CISO, December 2010 Information Security Risk Advisory Web Browsing Software attacks that exploit web browsers (e.g., Internet Explorer, Firefox, Safari, Chrome, Opera) are on the rise. Cyber criminals frequently attack web browsers to take control of computers, delete files, steal personally

Queitsch, Christine

145

Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee  

SciTech Connect (OSTI)

This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for former waste management units, legacy contamination source areas and distribution of contamination in soils, and environmental infrastructure (e.g., caps, monitoring systems, etc.) that is in place or planned in association with RAs. (3) Regulatory considerations and processes for management and disposition of waste soil upon generation, including regulatory drivers, best management practices (BMPs), waste determination protocols, waste acceptance criteria, and existing waste management procedures and BMPs for Y-12. This Soil Management Plan provides information to project planners to better coordinate their activities with other organizations and programs with a vested interest in soil disturbance activities at Y-12. The information allows project managers and maintenance personnel to evaluate and anticipate potential contaminant levels that may be present at a proposed soil disturbance site prior to commencement of activities and allows a more accurate assessment of potential waste management requirements.

None

2005-03-02T23:59:59.000Z

146

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartmentStewardshipAdministration helps|STEMChernobylMarchInformation |

147

Area Information | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone by E-mailRadioimmunotherapyArchiveAre Earths Rare?Information

148

Secure quantum private information retrieval using phase-encoded queries  

E-Print Network [OSTI]

We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries {[}Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that...

Olejnik, L

2011-01-01T23:59:59.000Z

149

Information Security: The Human Perspective Kathleen M. Carley  

E-Print Network [OSTI]

, redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing), CASOS 颅 the center for Computational Analysis of Social and Organizational Systems at Carnegie Mellon network and knowledge management approach to discovering organizational vulnerabilities within companies

Sadeh, Norman M.

150

InformationTechnologies& BusinessandManagement  

E-Print Network [OSTI]

interactive planning Learn to transition your management style from rigid frameworks and plans to a cultureInformationTechnologies& BusinessandManagement extension.uci.edu/agile Agile Project Management standard of excellence. Agile Project Management Certificate Program Annual employer demand for individuals

Barrett, Jeffrey A.

151

Information Technology Specialist (System Analysis/Information Security)  

Broader source: Energy.gov [DOE]

A successful candidate in this position will provide the technical direction, planning, programming, implementation and operations of the Information Technology (IT) program for the Carlsbad Field...

152

MANAGEMENT INFORMATION SYSTEMS (MIS) CONCENTRATION FOR UNDERGRADUATES  

E-Print Network [OSTI]

MANAGEMENT INFORMATION SYSTEMS (MIS) CONCENTRATION FOR UNDERGRADUATES The management information systems concentration, like a major, focuses on the use of information technology for value creation creation. Link to Rensselaer 2012-2013 Catalog Required Courses MGMT 4240 Systems Analysis & Design MGMT

Salama, Khaled

153

Digital Publishing Procedures Category: Information Management  

E-Print Network [OSTI]

(WA) Policy Manager Vice President Corporate Relations and Development Contact Director, Digital Media1 Digital Publishing Procedures Category: Information Management 1. LEGISLATION a framework for the publishing of the University's digital communications, including but not limited to all

154

The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories  

Broader source: Energy.gov [DOE]

The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories was presented to CRENEL 9/15/2014.

155

The 5 Waves of Information Security From Kristian Beckman to the Present  

E-Print Network [OSTI]

The 5 Waves of Information Security 颅 From Kristian Beckman to the Present Prof SH (Basie) von to the present time. The paper makes use of two papers by the author, Information Security 颅 the Third Wave (von Solms, 2000) and Information Security 颅 the Fourth Wave (von Solms, 2006), as well as a paper

Boyer, Edmond

156

Credit Leona Securities Asia CLSA UK | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentratingRenewable Solutions LLC Jump to:InformationCrandall, Texas:Credit Leona Securities

157

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

158

Customizable application for personal information management  

E-Print Network [OSTI]

As digital content becomes increasingly pervasive in our daily lives, next-generation organizational tools must be developed to help end users curate that information. The information management tools available today are ...

Liu, Jamie, M. Eng. Massachusetts Institute of Technology

2010-01-01T23:59:59.000Z

159

Secure Information Exchange Gateway for Electric Grid Operations  

SciTech Connect (OSTI)

The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

Robertson, F.; Carroll, J.; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

2014-09-30T23:59:59.000Z

160

Secure quantum private information retrieval using phase-encoded queries  

SciTech Connect (OSTI)

We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

2011-08-15T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

An introduction Information and Records Management  

E-Print Network [OSTI]

Bag 4800 Christchurch 8140 New Zealand www.canterbury.ac.nz Public RecordsAct ata glance 路 Only of the University. Public Records Act Information and Records Management at UC #12;Public RecordsAct2005 The Public Management team via records@canterbury.ac.nz. Archives New Zealand information on PRA, recordkeeping

Hickman, Mark

162

REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH  

E-Print Network [OSTI]

REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE's information systems. The uniform approach to describing controls for both national security and nonnational, implement, and assess their security controls most effectively when the process is carried out as part

163

UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY  

E-Print Network [OSTI]

UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

Adali, Tulay

164

NIST Seeks Input for Planned 2011 Update of Security Control Catalog For Federal Information Systems and Organizations  

E-Print Network [OSTI]

; Supply chain security; Industrial/process control systems; and Privacy. NIST SP 80053, Revision 3 Publication 80053, Recommended Security Controls for Federal Information Systems and Organizations webbased access to the security controls for federal information systems and organizations

165

Manager, Digital Developer Risk & Information Management Group  

E-Print Network [OSTI]

server 路 Deep understanding of the Web technology stack (TCP/IP, HTTP, HTML, XHTML, XML, JavaScript, CSS with at least one web programming languages such as Python, PHP, C/C++, C#, Ruby, or Java, especially on web, or other Web 2.0 solutions 路 Experience in machine learning, information retrieval, large-scale data mining

Plotkin, Joshua B.

166

Waste Management Information System (WMIS) User Guide  

SciTech Connect (OSTI)

This document provides the user of the Waste Management Information System (WMIS) instructions on how to use the WMIS software. WMIS allows users to initiate, track, and close waste packages. The modular design supports integration and utilization of data throuh the various stages of waste management. The phases of the waste management work process include generation, designation, packaging, container management, procurement, storage, treatment, transportation, and disposal.

R. E. Broz

2008-12-22T23:59:59.000Z

167

Information Technology Specialist (Data Management)  

Broader source: Energy.gov [DOE]

(See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Corporate Services Office, Office of the Chief Information Officer, Enterprise...

168

Algorithms and architecture for multiusers, multi-terminal, multi-layer information theoretic security  

E-Print Network [OSTI]

As modern infrastructure systems become increasingly more complex, we are faced with many new challenges in the area of information security. In this thesis we examine some approaches to security based on ideas from ...

Khisti, Ashish, 1979-

2009-01-01T23:59:59.000Z

169

Voluntary Disclosure and Information Asymmetry: Evidence from the 2005 Securities Offering Reform  

E-Print Network [OSTI]

In 2005, the Securities and Exchange Commission enacted the Securities Offering Reform (Reform), which relaxes 揼un-jumping restrictions, thereby allowing firms to more freely disclose information before equity offerings. ...

SHROFF, NEMIT

170

Proceedings of the 7th World Conference on Information Security Education  

E-Print Network [OSTI]

Proceedings of the 7th World Conference on Information Security Education 9-10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1-933510-94-3 漏 IFIP TC11.8 97 moment. Thus, the notion of security varies

Bishop, Matt

171

Security Requirements for Management Systems using Mobile Agents H. Reiser G. Vogt  

E-Print Network [OSTI]

Security Requirements for Management Systems using Mobile Agents H. Reiser G. Vogt Munich Network Management Team Munich Network Management Team University of Munich, Germany Munich University of Technology and distributed management systems based on mobile agents have certain advantages over centralized and static

172

Evergreen Securities formerly Ethanol Investments | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It isInformationexplains a4Evendale, Ohio: EnergySecurities formerly

173

Security in Information Systems: New Challenges and Opportunities  

E-Print Network [OSTI]

systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment. This Special Issue of the international Journal of Universal Computer Science includes papers received from

Jurjens, Jan

174

MBA Concentration in Analytics & Information Management A I M : Analytics & Information Management  

E-Print Network [OSTI]

MBA Concentration Management Science and Information Systems Michael N. Katehakis, Chair Douglas Jones Sampling 16:540:580 Quality Management Take 3 courses from Area 2 and 1 course from Area 1. 5 / 9 #12;MBA Process Analysis Manager of Information System Analysis Health Care Revenue Cycle Consultant Investment

Lin, Xiaodong

175

Enriching personal information management with document interaction histories  

E-Print Network [OSTI]

Enriching personal information management with document interaction histories by Karl Gyllstrom;Abstract KARL GYLLSTROM: Enriching personal information management with document interaction histories. (Under the direction of David Stotts.) Personal information management is increasingly challenging

Whitton, Mary C.

176

Office of Legacy Management. Information and Records Management. Transition Guidance  

SciTech Connect (OSTI)

The Office of Legacy Management (LM) is an integral part of the U.S. Department of Energy抯 (DOE抯) strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. LM will work with each site using an integrated team approach to ensure a successful transition. Part of this process will include transition of Government records and information. The Office of Legacy Management Information and Records Management Transition Guidance focuses on LM抯 goal to preserve and protect legacy records and information. This guidance document establishes a framework for the transfer of records management responsibilities for sites transferring to LM. It describes the requirements, responsibilities, and procedures for the efficient and cost-effective transfer of custody, ownership, and management of records and other information products from the transfer site to LM. Records management practices are critical to the functions of Federal agencies because records provide information about, or evidence of, the organization, functions, policies, decisions, procedures, operations, or other activities. Therefore, the information generated by an agency is created, maintained, and dispositioned through records management processes that ensure the appropriate preservation and retrieval of essential information. Because of their intrinsic value, best practices to preserve information and records should be utilized when records are transferred from one organization to another. As the transfer program completes cleanup activities at closure sites, a transitional process will facilitate the transparent shift in the management of site records activities to LM. The roles and responsibilities of the transfer site and/or program and LM described in this document are a necessary foundation for cooperation and coordination and are essential to the successful transition of records and information responsibilities. The DOE Office of the Chief Information Officer (OCIO) has a central role in DOE records management by providing guidance, expertise, and coordination to all DOE offices and organizations and coordination with the National Archives and Records Administration (NARA). LM and the transfer site will complete an integrated transition plan which will integrate all transition elements including information and records. As part of the overall transition plan, an Information and Records Transition Plan will be developed consistent with the integrated transition plan for the site transfer and included as an attachment. The Information and Records Management Transition Plan will be developed to assist both organizations in organizing the tasks; establishing a timetable and milestones for their completion; and identifying manpower, funding and other resources that will be needed to complete the ownership transfer. In addition, the plan will provide a valuable exchange of institutional knowledge that will assist LM in meeting the obligations of responsibly managing legacy records. Guidance for the development of the plan is included in this document. Records management concerns that may arise during site closure, such as management support, contract language and agreements, interactions with the OCIO and NARA, resource and budget considerations, and procedures to safeguard records are addressed. Guidelines and criteria for records management transition activities are also provided. These include LM expectations for the inventory, scheduling, and disposition of records; the management and transfer of electronic files, including databases and software; records finding aids, indices, and recordkeeping systems; and the process for the transfer of hard copy and electronic records to LM.

none,

2004-03-01T23:59:59.000Z

177

Information Flow Control for Secure Web Sites Maxwell Norman Krohn  

E-Print Network [OSTI]

smaller, and configure the Web site's security policies. They need only change when the policy changes

178

THE UNIVERSITY OF TEXAS AT DALLAS INFORMATION SECURITY  

E-Print Network [OSTI]

. Instead, these requirements should be integrated into a comprehensive system security plan. II. Scope

O'Toole, Alice J.

179

Information-Theoretically Secure Communication Under Channel Uncertainty  

E-Print Network [OSTI]

. In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We...

Ly, Hung Dinh

2012-07-16T23:59:59.000Z

180

Quality Management  

Broader source: Energy.gov [DOE]

The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

CONTRACTOR ASBESTOS INFORMATION ASBESTOS MANAGEMENT AT SFU  

E-Print Network [OSTI]

CONTRACTOR ASBESTOS INFORMATION ASBESTOS MANAGEMENT AT SFU An extensive Asbestos Survey has been term Asbestos Management Program was approved by the Workers' Compensation Board of British Columbia. Note: There is a possibility that ACM containing materials may not have been identified or labeled

182

LM Records and Information Management Transition Guidance (January...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Records and Information Management Transition Guidance (January 2015) LM Records and Information Management Transition Guidance (January 2015) This guidance document establishes a...

183

U-168: EMC Documentum Information Rights Management Server Bugs...  

Broader source: Energy.gov (indexed) [DOE]

8: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote...

184

Guidance for FY2014 Facilities Information Management System...  

Office of Environmental Management (EM)

Guidance for FY2014 Facilities Information Management System Data Validations Guidance for FY2014 Facilities Information Management System Data Validations FY 2014 FIMS Data...

185

Energy Management and Information Systems Study - 2014 BTO Peer...  

Energy Savers [EERE]

Management and Information Systems Study - 2014 BTO Peer Review Energy Management and Information Systems Study - 2014 BTO Peer Review Presenter: Jessica Granderson, Lawrence...

186

RT-Based Administrative Models for Community Cyber Security Information Sharing  

E-Print Network [OSTI]

RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan Institute for Cyber Security & Department of Computer Science Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas at San

Sandhu, Ravi

187

Scientific and Technical Information Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this directive is to ensure that STI is appropriately managed as part of the DOE mission to enable the advancement of scientific knowledge and technological innovation. Cancels DOE O 241.1A and DOE O 241.1A Chg 1.

2010-12-13T23:59:59.000Z

188

Safeguards and Security for Program and Project Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Guide provides a methodology for implementing the safeguards and security requirements of DOE O 413.3B. Cancels DOE G 413.3-3.

2013-08-15T23:59:59.000Z

189

Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes  

SciTech Connect (OSTI)

The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

Madden, Michael S.

2010-05-01T23:59:59.000Z

190

Cyber safety : a systems thinking and systems theory approach to managing cyber security risks  

E-Print Network [OSTI]

If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet ...

Salim, Hamid M

2014-01-01T23:59:59.000Z

191

CargoNet : micropower sensate tags for supply-chain management and security  

E-Print Network [OSTI]

This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state ...

Malinowski, Mateusz Ksawery

2007-01-01T23:59:59.000Z

192

Efficient Private Information Retrieval Using Secure Xiangyao Yu, Christopher W. Fletcher  

E-Print Network [OSTI]

attention from the cryptography and security communities. Two main approaches to solve PIR have appearedEfficient Private Information Retrieval Using Secure Hardware Xiangyao Yu, Christopher W. Fletcher, marten, devadas}@mit.edu ABSTRACT Existing crypto-based Private Information Retrieval (PIR) schemes

Gummadi, Ramakrishna

193

UNIVERSITY OF PITTSBURGH AT GREENSBURG Management -Information Systems  

E-Print Network [OSTI]

UNIVERSITY OF PITTSBURGH AT GREENSBURG Management - Information Systems u n d e r g r a d u a t e p r o g r a m Management - Information Systems 48 credits Bachelor of Science Management - Information Accounting MGMT 1818 Management Science INFSCI 0010 Introduction to Information Systems and Society Area

Sibille, Etienne

194

Recommendation 171: Commendation for Waste Information Management System  

Broader source: Energy.gov [DOE]

The ORSSAB commends DOE and Florida International University for development of the Waste Information Management System.

195

PKI-based security for peer-to-peer information sharing  

SciTech Connect (OSTI)

The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.

Berket, Karlo; Essiari, Abdelilah; Muratas, Artur

2004-05-02T23:59:59.000Z

196

Security Analysis and Project Management Systems | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security andSecurity

197

Research With Students My principal research activities lie in information systems security with particular emphasis on access control  

E-Print Network [OSTI]

of security, and secure transaction processing. My recent research has expanded beyond information systemsResearch With Students My principal research activities lie in information systems security and mining, semantic web and multimedia delivery. 1 Major Results Security solutions for workflow systems

198

Scientific and Technical Information Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish Department of Energy (DOE) requirements and responsibilities to ensure that scientific and technical information (STI) is identified, processed, disseminated, and preserved in a manner that (a) enables the scientific community and the public to locate and use the unclassified and unlimited STI resulting from DOE's research and related endeavors and (b) ensures access to classified and sensitive unclassified STI is protected according to legal or Departmental requirements. Cancels DOE O 241.1. Canceled by DOE O 241.1A Chg 1.

2001-04-09T23:59:59.000Z

199

Vencon Management | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformation UCOpen EnergyVelankani Group Jump to: navigation, Place: United

200

Managerial information behaviour: Relationships among Total Quality Management orientation, information use environments, and managerial roles  

E-Print Network [OSTI]

NetWorking Total quality management and the control of workall information reported to management Quality means meetingby integrating total quality management and socio-technical

Simard, C; Rice, Ronald E

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Toward A Secure and Usable Cloud-based Password Manager for Web Browsers  

E-Print Network [OSTI]

on different websites. Password manager, particularly Browser-based Password Manager (BPM), is one of the most, we propose a novel Cloud-based Storage-Free BPM (CSF-BPM) design to achieve a high level of security with the desired confidentiality, integrity, and availability properties. We have implemented a CSF-BPM system

Yue, Chuan

202

PARS II New Contractor Information for Interconnection Security...  

Office of Environmental Management (EM)

V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

203

An interactive spatial information management system on the internet: the fire ant spatial information management system  

E-Print Network [OSTI]

to that information. The primary purpose of any information management system is to provide users with information that is complete, accurate, and in real-time (Obermeyer and Pinto 1994). The Internet has the capability to do just that with spatial data...

Dudek, Timothy Kirk

2000-01-01T23:59:59.000Z

204

Automated Information Management via Abductive Logic Agents  

E-Print Network [OSTI]

Automated Information Management via Abductive Logic Agents F.Toni 1 Imperial College of Science representation of networks and meta-data via abductive logic programs and make use of the reasoning engine abductive logic pro- grams are equipped with for checking as well as enforcing the properties represented

Toni, Francesca

205

Safeguards and Security for Program and Project Management - DOE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and Security Systems SHARE

206

Final Report Implementing Office of Management and Budget Information...  

Broader source: Energy.gov (indexed) [DOE]

Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (67 Fed Reg 62446) Final Report Implementing Office of Management and Budget...

207

Portland State University Confidentiality and Information Management Policy and Procedures  

E-Print Network [OSTI]

Portland State University Confidentiality and Information Management Policy and Procedures I:\\Staff\\DEV\\Office\\KATRINA\\WEB\\Policies Page\\Info Mgmt Policy & Procedures.doc 8/15/2008 PORTLAND STATE UNIVERSITY CONFIDENTIALITY and INFORMATION MANAGEMENT POLICY and PROCEDURES Confidentiality and Information Management Policy Information

Bertini, Robert L.

208

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

209

Proceedings of the 7 th World Conference on Information Security Education 910 June 2011, Lucerne, Switzerland  

E-Print Network [OSTI]

Proceedings of the 7 th World Conference on Information Security Education 9颅10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1颅933510颅94颅3 漏 IFIP TC11.8 97 moment. Thus, the notion of security varies

Bishop, Matt

210

Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard  

E-Print Network [OSTI]

Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard Stefan Fenz an ontology-based framework to improve the preparation of ISO/IEC 27001 audits, and to strengthen the security elaborate on how ISO/IEC 27001 artifacts can be inte- grated into this ontology. A basic introduction

211

Model-driven Security Policy Deployment: Property Oriented Approach  

E-Print Network [OSTI]

and managing the access control rules of an information system are some of the major concerns of security systems. We formally prove the process of de- ploying a security policy related to an information system the deployment of access control security policies. We show how the use of a formal ex- pression of the security

Garcia-Alfaro, Joaquin

212

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor  

E-Print Network [OSTI]

, was written by Karen Scarfone and Murugiah Souppaya of NIST, and by Amanda Cody and Angela Orebaugh of Booz Allen Hamilton. The new guide replaces NIST SP 800-42, Guideline on Network Security Testing. NIST SP

213

HQ Emergency Management Team (EMT) | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

protective actions) The EMT provides briefings andor reports to NNSA and Department of Energy senior management, coordinatesprovides support to field response operations, and...

214

Inspection of Emergency Management at the Office of Secure Transportat...  

Broader source: Energy.gov (indexed) [DOE]

with the identifi ed hazards. The emergency plan defi nes and conveys the management philosophy, organizational structure, administrative controls, decision-making...

215

NNSA selects Consolidated Nuclear Security, LLC to manage the consolidated  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministrationImprovement |contract

216

An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions  

E-Print Network [OSTI]

This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the ...

Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

2006-01-01T23:59:59.000Z

217

Information needs for risk management/communication  

SciTech Connect (OSTI)

The hazardous waste cleanup program under the Comprehensive Environmental Response, Compensation, and Liability Act (Superfund) is delegated to the ten Regions of the US Environmental Protection Agency (EPA) and has, to date, identified more than 33,000 sites for consideration. The size and complexity of the program places great demands on those who would provide information to achieve national consistency in application of risk assessment while meeting site-specific needs for risk management and risk communication.

Bennett, D.A. [Environmental Protection Agency, Washington, DC (United States)

1990-12-31T23:59:59.000Z

218

29.01.03.M1.16 Information Resources-Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

information resources. This includes, but is not limited to: laptops, Personal Digital Assistants (PDAs29.01.03.M1.16 Information Resources- Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.16 Information Resources 颅 Portable Devices: Information Security Approved

219

ORAU: National Security and Emergency Management Fact Sheet  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControlsOMB Policies OR I GI N A L S

220

ORISE National Security and Emergency Management: Contact Us  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControlsOMB Policies OR I GI NHow toContact

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Law Enforcement & Emergency Management Liaison | National Nuclear Security  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational NuclearhasAdministration77NuclearSecurity

222

NNSA Field Office Manager Moves | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclear SecurityNationalApplyMaintaining ForNProgram | NationalEstablished

223

Panel on protection and management of plutonium: Subpanel on safeguards and security  

SciTech Connect (OSTI)

Nuclear materials safeguards and security systems are described in the context of the nuclear nonproliferation regime. Materials of interest to safeguards, threats, proposals to strengthen International Atomic Energy Agency safeguards, evolving safeguards issues and requirements, system effectiveness, and elements of a global nuclear materials management regime are discussed. Safeguards are seen as an essential element of nuclear materials management, but not a driver for decisions regarding nuclear power or the disposal of excess weapon nuclear materials.

Tape, J.W.

1995-07-01T23:59:59.000Z

224

Delegating Network Security with More Information Stanford University  

E-Print Network [OSTI]

's networks. Delegation makes administrators less of a bottle- neck when policy needs to be modified and allows network administration to follow organizational lines. To enable del- egation, we propose ident authority, the network administrator, that administrator has usually had to configure myriad security

225

INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu  

E-Print Network [OSTI]

what might be lurking there ready to attack. According to the SANS (SysAdmin, Audit, Network, Security the Internet with an administrator's account, your computer is at an even higher risk since most malicious code is designed to infiltrate your computer by using the total access of the administrator's account against you

Shyy, Wei

226

CMAD IV 11/14/96 Information Security  

E-Print Network [OSTI]

utilities, power pools, vendors etc.. #12;CMAD IV 11/14/96 #12; #12; GridCo LineCo PoolCo Energy Merchant INFO INFO INFO $ $ $ PWR PWR PWR #12;CMAD IV 11/14/96 "Future" Is At Hand 路 Federal Energy Regulatory protection and audit practices inadequate. 路 Internal priorities limiting attention to security concerns

California at Davis, University of

227

Secure Business Process Management: A Roadmap Thomas Neubauer, Markus Klemen, Stefan Biffl  

E-Print Network [OSTI]

process life cycle. I. INTRODUCTION In many domains companies model and optimize their busi- ness process management (BPM) aims at efficiently creating business value there is a number of threats are continously increasing their resources to protect their business processes against security threats. Companies

228

Building boundary is necessary for the real estate industry, flood management, and homeland security applications.  

E-Print Network [OSTI]

Abstract Building boundary is necessary for the real estate industry, flood management, and homeland security applications. The extraction of building boundary is also a crucial and difficult step, and Purdue University campus are evaluated. Introduction Airborne lidar (light detection and ranging

Shan, Jie

229

Waste Management Facilities Cost Information Report  

SciTech Connect (OSTI)

The Waste Management Facility Cost Information (WMFCI) Report, commissioned by the US Department of Energy (DOE), develops planning life-cycle cost (PLCC) estimates for treatment, storage, and disposal facilities. This report contains PLCC estimates versus capacity for 26 different facility cost modules. A procedure to guide DOE and its contractor personnel in the use of estimating data is also provided. Estimates in the report apply to five distinctive waste streams: low-level waste, low-level mixed waste, alpha contaminated low-level waste, alpha contaminated low-level mixed waste, and transuranic waste. The report addresses five different treatment types: incineration, metal/melting and recovery, shredder/compaction, solidification, and vitrification. Data in this report allows the user to develop PLCC estimates for various waste management options.

Feizollahi, F.; Shropshire, D.

1992-10-01T23:59:59.000Z

230

Energy Security and Restoration Exercise Program/Best Practices and Information Sharing  

SciTech Connect (OSTI)

The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

Barbara McCabe; John Kovach

2009-03-30T23:59:59.000Z

231

29.01.03.M1.26 Information Resources Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

29.01.03.M1.26 Information Resources 颅 Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.26 Information Resources 颅 Information Security Risk Assessment Reviews security risk assessments are vital procedures for maintaining the security of information resources

232

Solar International Management Inc | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty Ltd Jump to:Information Silver Peak AreaOutline JumpHold JumpManagement Inc

233

National Interest Security Company NISC Formerly Technology Management  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte3InformationofServices TMS Inc | Open Energy Information

234

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect (OSTI)

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

2011-01-01T23:59:59.000Z

235

On the Computational Practicality of Private Information Retrieval Network Security and Applied Cryptography Lab  

E-Print Network [OSTI]

On the Computational Practicality of Private Information Retrieval Radu Sion Network Security of single-server computational pri- vate information retrieval (PIR) for the purpose of preserv- ing client access patterns leakage. We show that deployment of non-trivial single server PIR protocols on real

Carbunar, Bogdan

236

Mobile Technology Management - DOE Directives, Delegations, and...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

203.2, Mobile Technology Management by Denise Hill Functional areas: Mobile Technology, Information Technology, Information Security The order establishes requirements, assigns...

237

What can I do with a degree in Telecommunications and Information Management (TIM)  

E-Print Network [OSTI]

Communications Manager Production Line Manager Management Consulting Materials Controller Market Research AnalystWhat can I do with a degree in Telecommunications and Information Management (TIM) Telecommunications and Information Management involves the integration of business information systems

de Doncker, Elise

238

Information Security: The Human Perspective Kathleen M. Carley  

E-Print Network [OSTI]

, redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing resource records, and organizational accounting information. Recent cases of industrial espionage all point addressed if both technological and organizational issues are considered simultaneously. How should

Sadeh, Norman M.

239

LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS  

SciTech Connect (OSTI)

The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

Ray Fink

2006-10-01T23:59:59.000Z

240

The Value of Information in Inventory Management  

E-Print Network [OSTI]

Inventory management traditionally assumes the precise knowledge of the ... stage inventory management in a robust optimization framework; the precise...

2007-05-24T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Technology & Information Management Minor Curriculum Chart: 2013-2014  

E-Print Network [OSTI]

Technology & Information Management Minor Curriculum Chart: 2013-2014 http 11B or 19B TIM 105 Management of Technology I ISM 50 or perm. of instructor Entry Level Writing Requirement TIM 158 Business Strategy & Information Systems ISM 105 TIM 125 Management of Technology II

Stuart, Josh

242

Interactive Volumetric Information Visualization for Document Corpus Management  

E-Print Network [OSTI]

Interactive Volumetric Information Visualization for Document Corpus Management David S Ebert U must be extracted. By contrast, information analysis or document corpus management seeks to understand system that aids in the document corpus management task by em- ploying 3D volumetric visualization

Miller, Ethan L.

243

EcoSecurities Brasil Ltd | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It is classified asThisEcoGrid EU (Smart Grid Project) JumpEcoSecurities

244

TEPS/BPA Information | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign Object DamageSystemsU.S. TALKS1 | E nergyTEPS/BPA

245

NMMSS Information, Reports & Forms | National Nuclear Security  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclear SecurityNationalApplyMaintaining ForN x NSecurity| National

246

Emergency Public Information | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for37 East and West Other SLAC ResourcesSecurity /

247

Recommended Security Controls for Federal Information Systems and Organizations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST 800-53 Revision 3 + Draft Revision 4 Recommended

248

Moving Objects Information Management: The Database (Vision Paper)  

E-Print Network [OSTI]

transportation and air traffic control, weather forecasting, emergency response, mobile resource management, and mobile workforce. Location management, i.e. the management of transient location information, is an enabling technology for all these applications. Location management is also a fundamental component

Wolfson, Ouri E.

249

Information flow in the DAMA Project beyond database managers: Information flow managers  

SciTech Connect (OSTI)

To meet the demands of commercial data traffic on the information highway, a new look at managing data is necessary. One projected activity, sharing of point-of-sale information, is being considered in the Demand Activated Manufacturing Project of the American Textile Partnership project. A scenario is examined in which 100,000 retail outlets communicate over a period of days. They provide the latest estimate of demand for sewn products across a chain of 26,000 suppliers through the use of bill-of-materials explosions at four levels of detail. A new paradign the information flow manager, is developed to handle this situation, including the case where members of the supply chain fail to communicate and go out of business. Techniques for approximation are introduced to keep estimates of demand as current as possible.

Russell, L. [Argonne National Lab., IL (United States); Wolfson, O.; Yu, C. [Illinois Univ., Chicago, IL (United States)

1996-03-01T23:59:59.000Z

250

Service oriented architecture governance tools within information security .  

E-Print Network [OSTI]

??Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for (more)

Mokgosi, Letlhogonolo

2012-01-01T23:59:59.000Z

251

Green Bulletin Information for pest management professionals and pesticide applicators  

E-Print Network [OSTI]

Vol. 3 l No. 3 l May 2013 Green Bulletin Information for pest management professionals subscription to the Green Bulletin at http://www.ipm.ucdavis.edu/greenbulletin! What Can Landscape Managers Do

Ishida, Yuko

252

Wild deer management An issues paper to inform the  

E-Print Network [OSTI]

Wild deer management in Wales An issues paper to inform the preparation of a management strategy and action plan for wild deer in Wales #12;Contents Introduction and explanatory note.................................................... 3 1. Background: wild deer in Wales.................................................... 5 2. Current

253

Contract Administration & Business Management | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User GroupInformationE-Gov Contacts forScience (SC) Continuity

254

Information System Security Manager (ISSM) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietipDepartment ofTheDepartmentEnergy Industry

255

EEO Complaints Information for Managers | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct:DirectivesSAND2015-2127 O Dr.andAnnual Training |

256

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacksService

257

ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,  

E-Print Network [OSTI]

devices have been used by cyber- criminals to launch attacks both within and outside universities information resources and to take action to mitigate that threat. Action that is taken will be based resource has been launched; 4) confidential, private, or proprietary electronic information

Gering, Jon C.

258

Private Information Retrieval, Optimal for Users and Secure Coprocessors  

E-Print Network [OSTI]

@dbis.informatik.hu颅berlin.de Abstract. A private information retrieval (PIR) protocol allows a user to retrieve one of N records from a database while hiding the identity of the record from the database server. A PIR protocol is optimal Private Information Retrieval (PIR) protocols. Formally, a PIR protocol allows a user to retrieve one of N

Freytag, Johann-Christoph

259

An Information Security Education Initiative for Engineering and Computer Science  

E-Print Network [OSTI]

and electronic commerce. These applications rely on a collection of switching systems, databases, network Science Board Task Force on Information Warfare { Defense (IW-D) 7]: The reality is that the vulnerability of the Department of Defense { and of the nation { to o ensive information warfare attack is largely a self

260

Knowledge information management toolkit and method  

DOE Patents [OSTI]

A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

Hempstead, Antoinette R.; Brown, Kenneth L.

2006-08-15T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables  

SciTech Connect (OSTI)

Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

Not Listed

2011-09-01T23:59:59.000Z

262

Modified Letter from Tom Formanek, Manager, Ithaca Social Security Administration September 2011  

E-Print Network [OSTI]

for a Social Security number, becoming insured under Social Security, planning for retirement, and filing

Hemami, Sheila S.

263

Promoting safety, security, and sustainability: Institute fosters programs on natural resource science and management  

E-Print Network [OSTI]

science and management, the Texas A&M Institute of Renewable Natural Resources (IRNR) protects and promotes the safety, security, and sustainability of land, water, and wildlife. IRNR, a unit of Texas AgriLife Research and the Texas Agri... projects that promote sustainable land use through stewardship practices, land-use forecasting and policy, restoration ecology, and ecosystem services. Involved in working on landscape-scale restoration projects, IRNR developed the Trinity River...

Wythe, Kathy

2011-01-01T23:59:59.000Z

264

The Value of Information in Inventory Management  

E-Print Network [OSTI]

May 25, 2007 ... Abstract: Inventory management traditionally assumes the precise knowledge of the underlying demand distribution and a risk-neutral manager...

Gokhan Metan

2007-05-25T23:59:59.000Z

265

Best Management Practice #2: Information and Education Programs...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Best Management Practice 2: Information and Education Programs Educating users about water conservation is essential to sustain the savings of water-efficient technologies and...

266

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

267

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

268

2014 Construction Management Program Information The UNLV Construction Management program is accredited by the American Council for  

E-Print Network [OSTI]

2014 Construction Management Program Information The UNLV Construction Management program is accredited by the American Council for Construction Education (ACCE). Our most recent accreditation visit this information for the UNLV Construction Management program. If you have questions about the information

Walker, Lawrence R.

269

ISS-005, Laptop Encryption Standard 1/2 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-005, Laptop Encryption Standard 1/2 UCIT INFORMATION SECURITY STANDARDS Laptop Encryption Standard Definitions 1 1.1 Encryption: The process used to protect the confidentiality and integrity contained within it is appropriately encrypted. Applicability 3 This standard applies to all UofC owned

Habib, Ayman

270

University of London International Academy MSc/PG Dip in Information Security  

E-Print Network [OSTI]

from the criminal angle and presenting a study of computer crime and the computer criminal. We criminals. Pre-requisites None Essential Reading Cybercrime: The transformation of crime in the Information should be able to: follow trends in computer crime relate computer security methodologies to criminal

Royal Holloway, University of London

271

Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy  

E-Print Network [OSTI]

Lucas Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT controls Supported by the Zurich Information Security Center. Work done while at ETH Zurich, Switzerland

Maurer, Ueli

272

HybridSecure MPC: Trading InformationTheoretic Robustness for Computational Privacy  

E-Print Network [OSTI]

Lucas # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT--- Cryptographic controls # Supported by the Zurich Information Security Center. + Work done while at ETH Zurich

Maurer, Ueli

273

Division of Information Information Systems Documentation Enterprise Systems Management Framework Version 6.0  

E-Print Network [OSTI]

Division of Information Information Systems Documentation Enterprise Systems Management Framework Version 6.0 Enterprise Systems Management Framework Version: 6.0 Date: 2 Jan 2008 Status: Endorsed Systems Management Framework Version 6.0 DOCUMENT DETAILS Document Number CIS 0002/200504466 Document

Botea, Adi

274

A Knowledge-Engine Architecture for a Competence Management Information  

E-Print Network [OSTI]

focus of our work is to support the management of employees' competencies through using a KM approach focus of our work is to support the management of employees' competencies through using a KM approachA Knowledge-Engine Architecture for a Competence Management Information System Jos茅 Braga de

Kimble, Chris

275

A management information system model for convenience stores  

E-Print Network [OSTI]

of infomna- tion that convenience store managers can use to accomplisll coimoany objecti v s . This model will serv as a guide with which convenience store companies can set up thei r own management information systems . ~si. Obj eii es 1) Identify...', and 6) the organizational impact of a manage- ment information system. E~i i 1 R h i ll g I I 0 ~tip. 5 -. +s The majority of research on management information systems has been theoretically oriented. Little empirical research has been achieved...

Moede, Eric Arne

1978-01-01T23:59:59.000Z

276

Carnegie Mellon University 70-451 Management Information Systems: Spring 2012Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon Univ  

E-Print Network [OSTI]

Carnegie Mellon University 70-451 Management Information Systems: Spring 2012Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring

Gatterbauer, Wolfgang

277

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpIncMAKGalway Bay IEOWCCatcher.pngWavemill <MN Office of Energy

278

Security-Widefield, Colorado: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty Ltd Jump to: navigation, search Name: Seadov PtySeboeis,Information

279

Guide to the Management of Scientific and Technical Information  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide to the management of scientific and technical information (STI) provides nonmandatory guidelines for implementing the objective, requirements, and responsibilities of Department of Energy (DOE) O 241.1A, Scientific and Technical Information Management. Cancels DOE G 241.1-1. Canceled by DOE N 251.83. Best practices, instructions, and additional information are now accessible at www.osti.gov/stip.

2001-11-23T23:59:59.000Z

280

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

The theory of diversity and redundancy in information system security : LDRD final report.  

SciTech Connect (OSTI)

The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Pierson, Lyndon George

2010-10-01T23:59:59.000Z

282

Supply chain management (SCM) involves the management of materials and information across the entire supply chain. This includes raw material  

E-Print Network [OSTI]

Supply chain management (SCM) involves the management of materials and information across this concentration will be required to take three core courses: Materials and Supply Chain Management, Transportation Purchasing identify global sources of materials, select vendors, and manage negotiati

Calgary, University of

283

An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may partner with the  

E-Print Network [OSTI]

.S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA scaling

284

Office of Headquarters Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

285

Energy Department Seeks Information on Geothermal Risk and Uncertainty Management  

Broader source: Energy.gov [DOE]

The Energy Department's Office of Energy Efficiency and Renewable Energy (EERE) has issued a Request for Information (RFI) to help quantify and manage risk in geothermal exploration, in an effort...

286

15.568A Management Information Systems, Spring 2003  

E-Print Network [OSTI]

The course purpose is to provide the substance and skill necessary to make sound business decisions relating to information systems, and to work with senior line managers in the resolution of issues and problems in this ...

Gibson, Cyrus F.

287

Managing Information Flow between SysML and Modelica  

E-Print Network [OSTI]

Managing Information Flow between SysML and Modelica A Model-Based Design Project for ME6101ML and Modelica languages. Once I apply the method, I discuss the utility, limitations, and necessary future work

288

Audit Report on "The Office of Science's Management of Information Technology Resources"  

SciTech Connect (OSTI)

The Department of Energy's Office of Science (Science) and its facility contractors are aggressive users of information technology (IT) to support fundamental research in areas such as energy, environmental remediation and computational sciences. Of its $4 billion Fiscal Year 2008 budget, Science spent about $287 million to manage its IT program. This included cyber security activities, acquisition of hardware and software, and support service costs used to maintain the operating environments necessary to support the missions of the program. Prior Office of Inspector General reports have identified various issues with Science's management of its IT programs and resources. For instance, our report on Facility Contractor Acquisition and Management of Information Technology Hardware (DOE/IG-0768, June 2007) noted that the Science sites reviewed spent more than necessary when acquiring IT hardware. In another example, our review of The Department's Efforts to Implement Common Information Technology Services at Headquarters (DOE/IG-0763, March 2007) disclosed that Science's reluctance to adopt the Department of Energy Common Operating Environment (DOE-COE) at Headquarters contributed to the Department's inability to fully realize potential cost savings through consolidation and economies of scale. In light of the magnitude of the Office of Science IT program and previously identified program weaknesses, we initiated this audit to determine whether Science adequately managed its IT resources. Science had taken a number of actions to improve its cyber security posture and align its program to Federal requirements. Yet, our review disclosed that it had not taken some basic steps to enhance security and reduce costs. In particular, we found that: (1) For their non-scientific computing environments, all seven of the field sites reviewed (two Federal, five contractor) had implemented security configurations that were less stringent than those included in the Federal Desktop Core Configuration. This configuration was designed by the National Institute of Standards and Technology and its use was mandated by the Office of Management and Budget; (2) Although we previously highlighted weaknesses and recommended corrective actions, Science still had not fully established or enforced IT hardware standards for acquiring hardware such as desktop and laptop computers or related peripherals, contributing to significant unnecessary expenditures; and (3) While we have noted in a series of past reports that significant savings could be realized from aggregating demand for IT services and products across the enterprise, Science had not implemented a common infrastructure for users at its Federal sites and continued to maintain an IT environment independent of the Department's Common IT Operating Environment. The weaknesses identified were attributable, at least in part, to a lack of adequate policies and procedures for ensuring effective cyber security and hardware acquisition practices. In addition, Science had not effectively monitored the performance of its field sites to ensure that previously reported internal control weaknesses were addressed and had not implemented an appropriate mechanism to track its IT-related costs. Without improvements, Science may be unable to realize the benefits of improved security over its information systems, reduce costs associated with hardware acquisition, and lower IT support costs through consolidation of services. In particular, we determined that Science could potentially realize savings of more than $3.3 million over the next three years by better controlling hardware costs and implementing standards for certain equipment. Furthermore, Science could continue to pay for duplicative IT support services and fail to take advantage of opportunities to lower costs and apply potential savings to mission-related work. During the course of our audit work, we learned from Science officials that they had initiated the process of revising the Program Cyber Security Plan to better clarify its policy for implementing

None

2009-11-01T23:59:59.000Z

289

The Information System The ideal system manager has the curiosity of a cat,  

E-Print Network [OSTI]

Chapter 2 The Information System Manager #12;The ideal system manager has the curiosity of a cat manage? As a property level information system manager, you may manage the following 3 types of computer #12;Who should manage the information system? O Patience and good communication skills O Hands

290

Information Management in the Smart Grid: A Learning Game Approach  

E-Print Network [OSTI]

Information Management in the Smart Grid: A Learning Game Approach H茅l猫ne Le Cadre MINES Paris In this article, the smart grid is modeled as a decentralized and hierarchical network, made of three categories the deployment of smart Information and Communication Technolo- gies (ICTs), to supervise the grid operation [5

Paris-Sud XI, Universit茅 de

291

Student Brand Manager and Related Vacancies Student Information  

E-Print Network [OSTI]

The Careers Service. Student Brand Manager and Related Vacancies Student Information Context and vacancy service to current students and recent graduates of the University. While recognising it also students and graduates. Students and graduates can expect to access a range of vacancy information

Stevenson, Mark

292

The Value of Information in Inventory Management  

E-Print Network [OSTI]

demand is not available, but the decision-maker receives advance information on the success. (high, low or ... of the market response at such an early stage of the product lifecycle. ...... Technical report, Massachusetts Institute of Technology,.

2008-04-08T23:59:59.000Z

293

Commercial Algae Management | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergyCTBarreisVolcanicPowerRaftColumbia RuralCommercial Algae Management

294

Community Management Company | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergyCTBarreisVolcanicPowerRaftColumbiaCommercialEconomicManagement

295

Determining information management needs for enhanced international safeguards  

SciTech Connect (OSTI)

The Safeguards Information Management System initiative is a program of the Department of Energy`s (DOE) Office of Arms Control and Nonproliferation aimed at supporting the International Atomic Energy Agency`s (IAEA) efforts to strengthen safeguards through the enhancement of information management capabilities. The DOE hopes to provide the IAEA with the ability to correlate and analyze data from existing and new sources of information, including publicly available information, information on imports and exports, design information, environmental monitoring data, and non-safeguards information. The first step in this effort is to identify and define IAEA requirements. In support of this, we have created a users` requirements document based on interviews with IAEA staff that describes the information management needs of the end user projected by the IAEA, including needs for storage, retrieval, analysis, communication, and visualization of data. Also included are characteristics of the end user and attributes of the current environment. This paper describes our efforts to obtain the required information. We discuss how to accurately represent user needs and involve users for an international organization with a multi-cultural user population. We describe our approach, our experience in setting up and conducting the interviews and brainstorming sessions, and a brief discussion of what we learned.

Badalamente, R.V. [Pacific Northwest Lab., Richland, WA (United States); DeLand, S.M. [Sandia National Labs., Albuquerque, NM (United States); Whiteson, R. [Los Alamos National Lab., NM (United States); Anzelon, G. [Lawrence Livermore National Lab., CA (United States)

1994-08-01T23:59:59.000Z

296

Environmental Resources Management ERM | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It isInformation ContractsCGNPC JVEnvergyInformationERM Jump to:

297

Federal Emergency Management Information system (FEMIS) data management guide. Version 1.2  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the data files and database that support the administrative, user-environment, database management, and operational capabilities of FEMIS. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, how it is loaded, and how it is managed while the system is in operation.

Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Johnson, S.M.; Loveall, R.M.; Winters, C.

1996-05-01T23:59:59.000Z

298

UNIVERSITY OF CENTRAL FLORIDA 348 Undergraduate Catalog 2014-2015 Health Informatics and Information Management -  

E-Print Network [OSTI]

hrs) HIM 3006 Foundations of Health Information Management (HIM) 3 hrs HIM 4508C Quality Management 3 hrs HIM 4656C Health Information Management Systems 3 hrs HSC 3537 Medical Terminology 3 hrs HIM 4226C and Information Management - Minor College of Health and Public Affairs Department of Health Management

Wu, Shin-Tson

299

Evidential Grids Information Management in Dynamic Environments  

E-Print Network [OSTI]

of Compi鑗ne CNRS Heudiasyc UMR 7253, France Email: surname.name@utc.fr Abstract--An occupancy grid map conditions. The perception strategy involves map and scan grids [9], [10]. Indeed, an instantaneous scan grid-detections. The map grid acts as a filter that accumulate information and allows to detect moving objects. In dynamic

Paris-Sud XI, Universit de

300

Position Management and Classification (Informational Purposes Only)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This draft has been scheduled for final review before the Directives Review Board on 02/5/2015. All major comments and concerns should be provided to your DRB representative by 02/3/2015, following your organization process. If you do not know who your representative is, please see the list of DRB members. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-1014).

2015-01-26T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Acquisition Career Management Program (Informational Purposes Only)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This draft has been scheduled for final review before the Directives Review Board on 12-4-2014. All major comments and concerns should be provided to your DRB representative, following your organization process. If you do not know who your representative is, please see the list of DRB members at https://www.directives.doe.gov/beta/references/directives-review-board. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-4014). All major comments and concerns should be submitted by COB 12-2-2014.

2014-11-21T23:59:59.000Z

302

Wista Management GMBH | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:SeadovCooperative JumpWilliamson County,Bay,掳 LoadingWiseEnergy Jump to:Wista Management

303

Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0  

SciTech Connect (OSTI)

This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan抯 purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs梩he Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)梐nd their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

Farnham, Irene; Marutzky, Sam

2014-12-01T23:59:59.000Z

304

Information Collection Management | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehicles 禄Exchange Visitors HistoryHybrid WindInformation Collection

305

Applied Energy Management | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300AlgoilEnergy Information the Army Permit:

306

Akeida Capital Management | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergy Information LightningAikenAkan, Wisconsin: EnergyAkeida

307

Calpine Power Management LLC | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160Benin: EnergyBoston Areais3:Information USCalloway County,

308

Broad knowledge of information technologies: a prerequisite for the effective management of the integrated information system  

SciTech Connect (OSTI)

There is a trend towards the bringing together of various information technologies into integrated information systems. The managers of these total systems therefore must be familiar with each of the component technologies and how they may be combined into a total information system. To accomplish this, the effective manager should first define the overall system as an integrated flow of information with each step identified; then, the alternate technologies applicable to each step may be selected. Methods of becoming technologically aware are suggested and examples of integrated systems are discussed.

Landau, H.B.

1980-09-01T23:59:59.000Z

309

15.568B Management Information Systems: Generating Business Value from Information Technology, Spring 2003  

E-Print Network [OSTI]

Concepts, frameworks, tools, techniques, and processes that assist management in its interaction with and direction of computer-based information systems today. Discusses the impact of the Internet, changes in the IT ...

Weill, Peter

310

Vencon Management, Inc | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformation UCOpen EnergyVelankani Group Jump to: navigation, Place:

311

Oregon Coastal Management Program | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth'sOklahoma/GeothermalOrange County is a county in Florida. Its FIPSManagement

312

Guinness Asset Management | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:Photon Place:Net Jump Agency/Company(Redirected from

313

Century Asset Management | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160Benin:Energy Information on PV2009 | Open EnergyHall,as RenovablesCentrothermAsset

314

UPC Solar Managment LLC | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformation UC 19-6-401 et seq. - UtahAsia Climate Change NetworkUNSUPC

315

Environmental Management Associates | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It isInformation ContractsCGNPC JVEnvergy

316

Help:Managing files | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:Photon Place:NetHealth DivisionHelio

317

How Communities Manage Forests | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:PhotonHolyName HousingIII Wind Farm FacilityPotSpringsHouston,How

318

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

319

National Bald Eagle Management Guidelines | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte3Informationof EnergyNapaInformation UsEagle Management

320

PIA - Human Resources Management Information System (HRMIS) | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002OpticsPeriodical: Volume 5,PETPIVWebEnergy Information

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

University of London International Academy MSc/PG Dip in Information Security  

E-Print Network [OSTI]

a computing system secure. This process starts with defining the proper security requirements, which system level. In order to understand these security controls we need to describe some background material systems will be examined as well as security related issues of computer architecture. Specific well

Royal Holloway, University of London

322

Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation  

E-Print Network [OSTI]

number 428/11), Cabarnit Cyber Security MAGNET Consortium, Grant from the Institute for Future Defense;1 Introduction Secure multi-party computation (MPC) is a powerful concept in secure distributed computing Theoretically Secure Multi-Party Computation (Preliminary Report) Shlomi Dolev1 and Niv Gilboa2 and Ximing Li1 1

323

Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).  

SciTech Connect (OSTI)

Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

2004-11-01T23:59:59.000Z

324

ACM Journal of Educational Resources in Computing, Vol. 6, No. 3, September 2006. Article 3. Teaching Context in Information Security  

E-Print Network [OSTI]

__________________________________________________________________________________________ 1. INTRODUCTION Software engineers used standard software engineering processes to develop software political science, history, as well as other humanities, to force students to apply or derive principles and Protection General Terms: Management, Security Additional Key Words and Phrases: Environment, judgment

Bishop, Matt

325

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses in length. Admission to the Faculty may occur at the end of Year One. Students are required to have the following courses for  

E-Print Network [OSTI]

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses-language university. BachelorofManagement ManagementInformationSystems Name Technology Management 4090 - Management Policy and Strategy Management 4840 - Systems Analysis Management

Seldin, Jonathan P.

326

Using Utility Information to Calibrate Customer Demand Management Behavior Models  

E-Print Network [OSTI]

Using Utility Information to Calibrate Customer Demand Management Behavior Models Murat Fahrio 颅 Madison Report PSerc 99颅06 June 10, 1999 Abstract In times of stress customers can help a utility by means be optimized if the utility can estimate the outage or substitution costs of its customers. This report

327

Department of Management Science and Information Systems Seminar  

E-Print Network [OSTI]

Department of Management Science and Information Systems Seminar You are cordially invited, to provide a methodology for generating the conditional price-transition probabilities, as required's eBay store. We are using a model where each period there is a probability a price-transition occurs

Lin, Xiaodong

328

A Context Driven Information Retrieval for Online Urban Disaster Management System  

E-Print Network [OSTI]

A Context Driven Information Retrieval for Online Urban Disaster Management System Khaldoun ZREIK of Disaster Managing Approaches depends firmly on information and communication management system. Due to the interactive decision board, an optimised Data Base Management System, a light Geographical Information System

Paris-Sud XI, Universit茅 de

329

System and method for acquisition management of subject position information  

DOE Patents [OSTI]

A system and method for acquisition management of subject position information that utilizes radio frequency identification (RF ID) to store position information in position tags. Tag programmers receive position information from external positioning systems, such as the Global Positioning System (GPS), from manual inputs, such as keypads, or other tag programmers. The tag programmers program each position tag with the received position information. Both the tag programmers and the position tags can be portable or fixed. Implementations include portable tag programmers and fixed position tags for subject position guidance, and portable tag programmers for collection sample labeling. Other implementations include fixed tag programmers and portable position tags for subject route recordation. Position tags can contain other associated information such as destination address of an affixed subject for subject routing.

Carrender, Curt (Morgan Hill, CA)

2007-01-23T23:59:59.000Z

330

There is an increasing order in digitized technology. This increasing order requires high qualitative document management system which can be used in secure fashion especially for organization with  

E-Print Network [OSTI]

qualitative document management system which can be used in secure fashion especially for organization with different branches and different location. In this paper we propose a qualitative document management. The proposed framework provides the necessary options for creating an effective document management system

331

A method of assessing users' vs managers' perceptions of safety and security problems in public beach park settings  

E-Print Network [OSTI]

while answering this form of report, research has proven that the respondents are generally truthful and accurate in the in- formation they provide (Sheley 1979; Levine 1982). Due to the transitory nature of park users this system would...A METHOD OF ASSESSING USERS' VS MANAGERS' PERCEPTIONS OF SAFETY AND SECURITY PROBLEMS IN PUBLIC BEACH PARK SETTINGS A Thesis by ROBERT JAMES SCOTT STEELE Submitted to the Graduate College of Texas A&M University In Par ial Fulfillment...

Steele, Robert James Scott

2012-06-07T23:59:59.000Z

332

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

333

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

334

A Breakthrough for Prepaid Payment: End to End Token Exchange and Management Using Secure SSL Channels Created by EAP-TLS Smart Cards  

E-Print Network [OSTI]

A Breakthrough for Prepaid Payment: End to End Token Exchange and Management Using Secure SSL SSL tunnels between smart cards, or between smart cards and SSL servers. SSL [8] [9] is the de facto

Paris-Sud XI, Universit de

335

Corrective Action Management Units and Temporary Units. RCRA Information Brief  

SciTech Connect (OSTI)

On February 16, 1993 the EPA published a final rule that allows either the EPA Regional Administrator or the authorized State to designate areas as corrective action management units (CAMUs) at hazardous waste management facilities for the specific purpose of managing remediation waste that has been generated as part of the facility`s corrective action activities. According to the rule, placement of remediation wastes into or within a CAMU does not constitute land disposal of hazardous waste and is not subject to RCRA land disposal restrictions. In addition, waste disposal units located within CAMUs are not required to be designed in accordance with RCRA minimum technological requirements applicable to land disposal units. This Information Brief explains the advantages of a CAMU designation, defines a Temporary Unit (TU) and explains the advantages of a TU designation. The process for initiating a CAMU or TU designation is described for DOE sites and interim status facilities.

Not Available

1994-03-01T23:59:59.000Z

336

Nevada National Security Site 2012 Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Site  

SciTech Connect (OSTI)

Environmental monitoring data are collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, and vadose zone. This report summarizes the 2012 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports (National Security Technologies, LLC, 2012; 2013a; 2013b). Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Slightly elevated exposure levels outside the Area 3 RWMS are attributed to nearby historical aboveground nuclear weapons tests. Air monitoring data show tritium concentrations in water vapor and americium and plutonium concentrations in air particles are only slightly above detection limits and background levels. The measured levels of radionuclides in air particulates and moisture are below Derived Concentration Standards for these radionuclides. Groundwater monitoring data indicate the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by RWMS operations. Results of groundwater analysis from wells around the Area 5 RWMS were all below established investigation levels. Leachate samples collected from the leachate collection system at the mixed low-level waste cell were below established contaminant regulatory limits. The 133.9 millimeters (mm) (5.27 inches [in.]) of precipitation at the Area 3 RWMS during 2012 is 12% below the average of 153.0 mm (6.02 in.), and the 137.6 mm (5.42 in.) of precipitation at the Area 5 RWMS during 2012 is 11% below the average of 122.4 mm (4.82 in.). Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Automated vadose zone monitoring on Area 5 and Area 3 RWMS cell covers show no evidence of precipitation percolating through the cover to the waste. Moisture from precipitation did not percolate below 60 centimeters (cm) (2 feet [ft]) in the vegetated final cover on the U-3ax/bl disposal unit at the Area 3 RWMS, and moisture from precipitation and irrigation did not percolate below 45 cm (1.5 ft) on the 92-Acre Area final cover. Irrigation was applied to this cover for seed germination and plant growth. During 2012, there was no drainage through 2.4 meters (8 ft) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Twenty percent of the applied precipitation and irrigation drained from the bare-soil drainage lysimeter that received 3 times natural precipitation. All 2012 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

Hudson, David B.

2013-09-10T23:59:59.000Z

337

Nevada National Security Site 2010 Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Sites  

SciTech Connect (OSTI)

Environmental monitoring data were collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, vadose zone, subsidence, and biota. This report summarizes the 2010 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports (National Security Technologies, LLC, 2010a; 2010b; 2011). Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Air monitoring data at the Area 3 and Area 5 RWMSs indicate that tritium concentrations are slightly above background levels. All gamma spectroscopy results for air particulates collected at the Area 3 and Area 5 RWMS were below the minimum detectable concentrations, and concentrations of americium and plutonium are only slightly above detection limits. The measured levels of radionuclides in air particulates and moisture are below derived concentration guides for these radionuclides. Groundwater monitoring data indicate that the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by facility operations. The 246.9 millimeters (mm) (9.72 inches [in.]) of precipitation at the Area 3 RWMS during 2010 is 56 percent above the average of 158.7 mm (6.25 in.), and the 190.4 mm (7.50 in.) of precipitation at the Area 5 RWMS during 2010 is 50 percent above the average of 126.7 mm (4.99 in.). Soil-gas tritium monitoring at borehole GCD-05 continues to show slow subsurface migration consistent with previous results. Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Data from the automated vadose zone monitoring system for the operational waste pit covers show that moisture from precipitation did not percolate below 90 centimeters (cm) (3 feet [ft]) before being removed by evaporation. Moisture from precipitation did not percolate below 61 cm (2 ft) in the vegetated final mono-layer cover on the U-3ax/bl disposal unit at the Area 3 RWMS before being removed by evapotranspiration. During 2010, there was no drainage through 2.4 meters (8 ft) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Water drained from both the bare-soil drainage lysimeter and the invader species drainage lysimeter that received 3 times natural precipitation. All 2010 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

NSTec Environmental Management

2011-06-01T23:59:59.000Z

338

Nevada National Security Site 2013 Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Site  

SciTech Connect (OSTI)

Environmental monitoring data are collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) within the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, and vadose zone. This report summarizes the 2013 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports (National Security Technologies, LLC, 2013; 2014a; 2014b). Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Slightly elevated exposure levels outside the Area 3 RWMS are attributed to nearby historical aboveground nuclear weapons tests. Air monitoring data show tritium concentrations in water vapor and americium and plutonium concentrations in air particles are close to detection limits and background levels. The measured levels of radionuclides in air particulates and moisture are below Derived Concentration Standards for these radionuclides. Groundwater monitoring data indicate the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by RWMS operations. Results of groundwater analysis from wells around the Area 5 RWMS were all below established investigation levels. Leachate samples collected from the leachate collection system at the mixed low-level waste cell were below established contaminant regulatory limits. The 105.8 millimeters (mm) (4.17 inches [in.]) of precipitation at the Area 3 RWMS during 2013 is 30% below the average of 150.3 mm (5.92 in.), and the 117.5 mm (4.63 in.) of precipitation at the Area 5 RWMS during 2013 is 5% below the average of 123.6 mm (4.86 in.). Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Automated vadose zone monitoring on Area 5 and Area 3 RWMS cell covers show no evidence of precipitation percolating through the cover to the waste. Moisture from precipitation did not percolate below 60 centimeters (cm) (2 feet [ft]) in the vegetated final cover on the U-3ax/bl disposal unit at the Area 3 RWMS, and moisture from precipitation and irrigation did not percolate below 45 cm (1.5 ft) on the 92-Acre Area final cover. Irrigation was applied to this cover for seed germination and plant growth. During 2013, there was no drainage through 2.4 meters (8 ft) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Twenty percent of the applied precipitation and irrigation drained from the bare-soil drainage lysimeter that received 3-times natural precipitation. All 2013 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

Hudson, D. B.

2014-08-19T23:59:59.000Z

339

KNOWLEDGE: Building, Securing, Sharing & Applying  

E-Print Network [OSTI]

is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

340

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses in length. Admission to the Faculty may occur at the end of Year One. Students are required to have completed the following  

E-Print Network [OSTI]

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses. BachelorofManagement ManagementInformationSystems Name Systems Management Management 3080 - Managerial Skill Development *Management 3380 - Technological Change

Seldin, Jonathan P.

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses in length. Admission to the Faculty may occur at the end of Year One. Students are required to have completed the following  

E-Print Network [OSTI]

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses. BachelorofManagement ManagementInformationSystems Name Systems Management Management 3080 - Managerial Skill Development Management 3380 - Technological Change

Seldin, Jonathan P.

342

MANAGEMENT INFORMATION SYSTEMS (MIS) In a technology bound society, companies rely on  

E-Print Network [OSTI]

to the $44,000 Clay Barton Scholarship. Admission When you choose to major in Management Information Systems business, management, marketing, operations management, and personal selling. The W. Frank Barton School

343

T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID  

Broader source: Energy.gov [DOE]

RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

344

MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies  

E-Print Network [OSTI]

of configuration policies over network security components, such as firewalls, intrusion detection systems, and VPN the advances in the field of network security technologies, such as filtering of traffic, use of encrypted be exploited by unauthorized parties. The use of firewalls, NIDSs (network intrusion detection systems

Garcia-Alfaro, Joaquin

345

Federal Emergency Management Information System (FEMIS) Data Management Guide Version 1.3  

SciTech Connect (OSTI)

FEMIS is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. FEMIS is designed to help civilian emergency management personnel to plan for and support their responses to a chemical-releasing event at a military chemical stockpile. This guide provides the background as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the datafiles and database. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, loaded, and managed while the system is in operation.

Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Hoza, M.; Johnson, S.M.; Loveall, R.M.; Millard, W.D.; Winters, C.; Wood, B.M.

1996-12-01T23:59:59.000Z

346

Technology & Information Management B.S. Degree Curriculum Chart: 2013-2014  

E-Print Network [OSTI]

Technology & Information Management B.S. Degree Curriculum Chart: 2013-2014 http Analysis & Design * TIM 105 Management of Technology I * TIM 125 Management of Technology II #* TIM 158 Business Strategy & Information Systems TIM 101 Management of Technology Seminar (2 units) * MATH 19B

Stuart, Josh

347

Technology & Information Management B.S. Degree Curriculum Chart: 2014-2015  

E-Print Network [OSTI]

Technology & Information Management B.S. Degree Curriculum Chart: 2014-2015 http Analysis & Design * TIM 105 Management of Technology I * TIM 125 Management of Technology II #* TIM 158 Business Strategy & Information Systems TIM 101 Management of Technology Seminar (2 units) * MATH 19B

Stuart, Josh

348

D and D Knowledge Management Information Tool - 2012 - 12106  

SciTech Connect (OSTI)

Deactivation and decommissioning (D and D) work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with the different ALARA (As-Low-As-Reasonably-Achievable) Centers, DOE sites, Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. D and D KM-IT provides single point access to all D and D related activities through its knowledge base. It is a community driven system. D and D KM-IT makes D and D knowledge available to the people who need it at the time they need it and in a readily usable format. It uses the World Wide Web as the primary source for content in addition to information collected from subject matter specialists and the D and D community. It brings information in real time through web based custom search processes and its dynamic knowledge repository. Future developments include developing a document library, providing D and D information access on mobile devices for the Technology module and Hotline, and coordinating multiple subject matter specialists to support the Hotline. The goal is to deploy a high-end sophisticated and secured system to serve as a single large knowledge base for all the D and D activities. The system consolidates a large amount of information available on the web and presents it to users in the simplest way possible. (authors)

Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P. [Applied Research Center, Florida International University, Miami. FL 33174 (United States); DeGregory, J. [Office of D and D and Facility Engineering, Environmental Management, Department of Energy (United States)

2012-07-01T23:59:59.000Z

349

Storing and managing information artifacts collected by information analysts using a computing device  

DOE Patents [OSTI]

Systems and computer-implemented processes for storage and management of information artifacts collected by information analysts using a computing device. The processes and systems can capture a sequence of interactive operation elements that are performed by the information analyst, who is collecting an information artifact from at least one of the plurality of software applications. The information artifact can then be stored together with the interactive operation elements as a snippet on a memory device, which is operably connected to the processor. The snippet comprises a view from an analysis application, data contained in the view, and the sequence of interactive operation elements stored as a provenance representation comprising operation element class, timestamp, and data object attributes for each interactive operation element in the sequence.

Pike, William A; Riensche, Roderick M; Best, Daniel M; Roberts, Ian E; Whyatt, Marie V; Hart, Michelle L; Carr, Norman J; Thomas, James J

2012-09-18T23:59:59.000Z

350

Secure multi-party communication with quantum key distribution managed by trusted authority  

DOE Patents [OSTI]

Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

2013-07-09T23:59:59.000Z

351

Quantifiably secure power grid operation, management, and evolution : a study of uncertainties affecting the grid integration of renewables.  

SciTech Connect (OSTI)

This report summarizes findings and results of the Quantifiably Secure Power Grid Operation, Management, and Evolution LDRD. The focus of the LDRD was to develop decisionsupport technologies to enable rational and quantifiable risk management for two key grid operational timescales: scheduling (day-ahead) and planning (month-to-year-ahead). Risk or resiliency metrics are foundational in this effort. The 2003 Northeast Blackout investigative report stressed the criticality of enforceable metrics for system resiliency - the grid's ability to satisfy demands subject to perturbation. However, we neither have well-defined risk metrics for addressing the pervasive uncertainties in a renewable energy era, nor decision-support tools for their enforcement, which severely impacts efforts to rationally improve grid security. For day-ahead unit commitment, decision-support tools must account for topological security constraints, loss-of-load (economic) costs, and supply and demand variability - especially given high renewables penetration. For long-term planning, transmission and generation expansion must ensure realized demand is satisfied for various projected technological, climate, and growth scenarios. The decision-support tools investigated in this project paid particular attention to tailoriented risk metrics for explicitly addressing high-consequence events. Historically, decisionsupport tools for the grid consider expected cost minimization, largely ignoring risk and instead penalizing loss-of-load through artificial parameters. The technical focus of this work was the development of scalable solvers for enforcing risk metrics. Advanced stochastic programming solvers were developed to address generation and transmission expansion and unit commitment, minimizing cost subject to pre-specified risk thresholds. Particular attention was paid to renewables where security critically depends on production and demand prediction accuracy. To address this concern, powerful filtering techniques for spatio-temporal measurement assimilation were used to develop short-term predictive stochastic models. To achieve uncertaintytolerant solutions, very large numbers of scenarios must be simultaneously considered. One focus of this work was investigating ways of reasonably reducing this number.

Gray, Genetha Anne; Watson, Jean-Paul [Sandia National Laboratories, Albuquerque, NM; Silva Monroy, Cesar Augusto [Sandia National Laboratories, Albuquerque, NM; Gramacy, Robert B. [University of Chicago, Chicago, IL

2013-09-01T23:59:59.000Z

352

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

353

Nevada National Security Site 2011 Waste Management Monitoring Report, Area 3 and Area 5 Radioactive Waste Management Site  

SciTech Connect (OSTI)

Environmental monitoring data are collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, and vadose zone. This report summarizes the 2011 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports. Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Slightly elevated exposure levels outside the Area 3 RWMS are attributed to nearby historical aboveground nuclear weapons tests. Air monitoring data show tritium concentrations in water vapor and americium and plutonium concentrations in air particles are only slightly above detection limits and background levels. The measured levels of radionuclides in air particulates and moisture are below derived concentration guides for these radionuclides. During the last 2 weeks of March 2011, gamma spectroscopy results for air particles showed measurable activities of iodine-131 (131I), cesium-134 (134Cs), and cesium-137 (137Cs). These results are attributed to the release of fission products from the damaged Fukushima Daiichi power plant in Japan. The remaining gamma spectroscopy results for air particulates collected at the Area 3 and Area 5 RWMS were below minimum detectable concentrations. Groundwater monitoring data indicate the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by RWMS operations. Results of groundwater analysis from wells around the Area 5 RWMS were all below established investigation levels. The 86.3 millimeters (mm) (3.40 inches [in.]) of precipitation at the Area 3 RWMS during 2011 is 44% below the average of 154.1 mm (6.07 in.), and the 64.8 mm (2.55 in.) of precipitation at the Area 5 RWMS during 2011 is 47% below the average of 122.4 mm (4.82 in.). Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Automated vadose zone monitoring on Area 5 RWMS operational waste covers was not done during 2011 due to construction of the final evapotranspiration cover at these monitoring locations. Moisture from precipitation did not percolate below 122 centimeters (4 feet) in the vegetated final mono-layer cover on the U-3ax/bl disposal unit at the Area 3 RWMS before being removed by evapotranspiration. During 2011, there was no drainage through 2.4 meters (8 feet) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Ten percent of the applied precipitation and irrigation drained from the bare-soil drainage lysimeter that received 3 times natural precipitation. All 2011 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

NSTec Environmental Management

2012-07-31T23:59:59.000Z

354

Bioinformatics process management: information flow via a computational journal  

E-Print Network [OSTI]

ral Source Code for Biology and ssBioMed CentMedicine Open AcceResearch Bioinformatics process management: information flow via a computational journal Lance Feagan, Justin Rohrer, Alexander Garrett, Heather Amthauer, Ed Komp, David Johnson...@ittc.ku.edu; Alexander Garrett - agarrett@ittc.ku.edu; Heather Amthauer - amthah@ittc.ku.edu; Ed Komp - komp@ittc.ku.edu; David Johnson - habib@ittc.ku.edu; Adam Hock - ahock@ittc.ku.edu; Terry Clark - tclark@ittc.ku.edu; Gerald Lushington - glushington@ku.edu; Gary...

Feagan, Lance; Rohrer, Justin P.; Garrett, Alexander S.; Amthauer, Heather A.; Komp, Ed; Johnson, David; Hock, Adam; Clark, Terry; Lushington, Gerald H.; Minden, Gary J.; Frost, Victor S.

2007-12-03T23:59:59.000Z

355

ADEQ Nonpoint Source State Management Plan | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights,Information Of TheFixed Logo: ACOREState Management

356

Executive Order 11988 - Floodplain Management | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It isInformationexplains a4Evendale, - Floodplain Management Jump to:

357

Review your system access with your company's Information Security Officer. Access that is not  

E-Print Network [OSTI]

. The FBI may be able to help you determine if these contacts pose any risk to you or your company. Change unusual circumstances or noteworthy incidents to your security officer and to the FBI. Notifying the FBI and country threat assessments are available from the FBI upon request. Good security habits will help protect

Shepp, Larry

358

Federal Emergency Management Information System (FEMIS). Data Management Guide, FEMIS: Phase 1, Version 1.1u  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the U.S. Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system.

Burnett, R.A.; Johnson, D.M.; Johnson, S.M. [and others

1995-06-01T23:59:59.000Z

359

DOE technology information management system database study report  

SciTech Connect (OSTI)

To support the missions of the US Department of Energy (DOE) Special Technologies Program, Argonne National Laboratory is defining the requirements for an automated software system that will search electronic databases on technology. This report examines the work done and results to date. Argonne studied existing commercial and government sources of technology databases in five general areas: on-line services, patent database sources, government sources, aerospace technology sources, and general technology sources. First, it conducted a preliminary investigation of these sources to obtain information on the content, cost, frequency of updates, and other aspects of their databases. The Laboratory then performed detailed examinations of at least one source in each area. On this basis, Argonne recommended which databases should be incorporated in DOE`s Technology Information Management System.

Widing, M.A.; Blodgett, D.W.; Braun, M.D.; Jusko, M.J.; Keisler, J.M.; Love, R.J.; Robinson, G.L. [Argonne National Lab., IL (United States). Decision and Information Sciences Div.

1994-11-01T23:59:59.000Z

360

Risk Informed Margins Management as part of Risk Informed Safety Margin Characterization  

SciTech Connect (OSTI)

The ability to better characterize and quantify safety margin is important to improved decision making about Light Water Reactor (LWR) design, operation, and plant life extension. A systematic approach to characterization of safety margins and the subsequent margin management options represents a vital input to the licensee and regulatory analysis and decision making that will be involved. In addition, as research and development in the LWR Sustainability (LWRS) Program and other collaborative efforts yield new data, sensors, and improved scientific understanding of physical processes that govern the aging and degradation of plant SSCs needs and opportunities to better optimize plant safety and performance will become known. To support decision making related to economics, readability, and safety, the Risk Informed Safety Margin Characterization (RISMC) Pathway provides methods and tools that enable mitigation options known as risk informed margins management (RIMM) strategies.

Curtis Smith

2014-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

362

U.S. DEPARTMENT OF ENERGY Information Collection Clearance Manager...  

Office of Environmental Management (EM)

(City, State) Security Classification Email Phone Number SECTION III. Appointee Acknowledgement I acknowledge my collateral duty appointment until canceled by the Approving...

363

Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)  

SciTech Connect (OSTI)

In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America抯 nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 揼reen technology.

Jesse Schreiber

2008-03-01T23:59:59.000Z

364

Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)  

SciTech Connect (OSTI)

In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America抯 nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization and improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 揼reen technology.

Jesse Schrieber

2008-07-01T23:59:59.000Z

365

Future Trends in Secure Chip Data Management Nicolas Anciaux, Luc Bouganim and Philippe Pucheral  

E-Print Network [OSTI]

of scaling down database techniques for the smart card and proposed the design of a DBMS kernel called PicoDBMS. This paper summarizes the learning obtained during an extensive performance analysis of PicoDBMS. Then it studies to which extent secure chips hardware evolution should impact the design of embedded data

366

1EMC CONFIDENTIAL--INTERNAL USE ONLY Cloud based Personal Information Management  

E-Print Network [OSTI]

1EMC CONFIDENTIAL--INTERNAL USE ONLY Cloud based Personal Information Management 颅 Introduction to EMC Cloud Computing Jidong Chen Sr. Research Scientist Information Management Group EMC Research China Dec., 2008 #12;2EMC CONFIDENTIAL--INTERNAL USE ONLY Agenda Introduction to Personal Information Cloud

367

Management innovations at outstanding information technology companies and implications for China  

E-Print Network [OSTI]

Over the past few decades, information technology has fundamentally changed the way we work as a society. Managers often forget that management itself also needs to change along with our evolving society. It is an opportunity, ...

Chan, Erik Chi-Hein

2010-01-01T23:59:59.000Z

368

Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.5  

SciTech Connect (OSTI)

The Federal Emergency Management System (FEMIS) is an emergency management planning and response tool. The FEMIS System Administration Guide provides information on FEMIS System Administrator activities as well as the utilities that are included with FEMIS.

Bower, John C. (BATTELLE (PACIFIC NW LAB)); Burnett, Robert A. (BATTELLE (PACIFIC NW LAB)); Carter, Richard J. (BATTELLE (PACIFIC NW LAB)); Downing, Timothy R. (BATTELLE (PACIFIC NW LAB)); Homer, Brian J. (BATTELLE (PACIFIC NW LAB)); Holter, Nancy A. (BATTELLE (PACIFIC NW LAB)); Johnson, Daniel M. (BATTELLE (PACIFIC NW LAB)); Johnson, Ranata L. (BATTELLE (PACIFIC NW LAB)); Johnson, Sharon M. (BATTELLE (PACIFIC NW LAB)); Loveall, Robert M. (BATTELLE (PACIFIC NW LAB)); Ramos Jr., Juan (BATTELLE (PACIFIC NW LAB)); Schulze, Stacy A. (BATTELLE (PACIFIC NW LAB)); Sivaraman, Chitra (BATTELLE (PACIFIC NW LAB)); Stephan, Alex J. (BATTELLE (PACIFIC NW LAB)); Stoops, Lamar R. (BATTELLE (PACIFIC NW LAB)); Wood, Blanche M. (BATTELLE (PACIFIC NW LAB))

2001-12-01T23:59:59.000Z

369

Directory Information Restriction Use this form to manage public access to your data at Boston University  

E-Print Network [OSTI]

Directory Information Restriction Use this form to manage public access to your data at Boston identifiable information as "Directory Information." A list of this information is below. Unless restricted, Boston University may disclose any of the items of Directory Information without your consent. Boston

Guenther, Frank

370

An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Request for Information  

E-Print Network [OSTI]

.S. Department of Energy's NNSA ASM-SUB Request for Information Los Alamos National Laboratory Field Instruments by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA General Tasks On

371

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

372

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

373

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

374

Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE  

E-Print Network [OSTI]

, authentication, provenance, and access control. Keywords-network cyber security; identity management; information environment, players1 are guided through a series of scenarios that highlight various cyber security education colleges. CyberCIEGE was created by the Center for Information Systems Security Studies and Research (CISR

375

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses in length. Admission to the Faculty may occur at the end of Year One. Students are required to have the following courses for  

E-Print Network [OSTI]

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses ManagementInformationSystems Name: __________________________________________________________ ID 4840 - Systems Analysis Management 4841 - Systems Design One of: Management 3380 - Technological Change

Seldin, Jonathan P.

376

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

377

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

378

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

379

Essays on the relation between managers' incentives and financial accounting information  

E-Print Network [OSTI]

(cont.) around thresholds do convey information about a firm's future performance, firms with a higher degree of information asymmetry between the management and investors are more likely to use this signaling mechanism, ...

Xue, Yanfeng, 1974-

2004-01-01T23:59:59.000Z

380

Quantifying improvements in the Engineering-Procurement-Construction (EPC) process from the implementation of information management strategies within materials management  

E-Print Network [OSTI]

Throughout all industries where material flow or handling is involved, employers have implemented various information management technologies with the following goals: 1) to reduce cost, time, and effort, 2) to improve productivity, 3) to streamline...

Toon, Jeffrey Lee

1997-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Insurance as a Risk Management Instrument for Energy Infrastructure Security and Resilience Report Now Available  

Broader source: Energy.gov [DOE]

The Office of Electricity Delivery and Energy Reliability has released a report that examines the key risks confronting critical energy infrastructure and ways in which the insurance industry can help manage these risks. In most developed countries, insurance is one of the principal risk management instruments for aiding in recovery after a disaster and for encouraging future investments that are more resilient to potential hazards.

382

ORISE National Security and Emergency Management: How to Work with Us  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControlsOMB Policies OR I GI NHow

383

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

384

Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks  

E-Print Network [OSTI]

for Secure Information Technology, Rheinstrasse 75, 64295 Darmstadt, Germany, hervais and systems pose specific requirements and because of the diversity of network access technologies of user identities and rights are not compatible. Especially for SMEs identity management and access

Paris-Sud XI, Universit茅 de

385

Managerial information behaviour: Relationships among Total Quality Management orientation, information use environments, and managerial roles  

E-Print Network [OSTI]

total quality management and socio-technical systems theory.management creates control systems that maintain and improve quality,

Simard, C; Rice, Ronald E

2006-01-01T23:59:59.000Z

386

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

387

Dynamic access policies for unconditionally secure secret  

E-Print Network [OSTI]

generation of cryptographic secrets 路 Key management in distributed environments 路 Multiparty computation #12 Awaji Island, Japan 2 Ueli's orders 路 Choose a topic related to information theoretic security 路 Provide an overview 路 Identify some open problems 路 Give a "nice talk" #12;ITW 2005 Awaji Island, Japan 3 A little bit

Martin, Keith

388

Appears in Secure Data Management: Second VLDB Workshop--SDM 2005, Lecture Notes in Computer Science 3674 (2005) 3346. Springer-Verlag. Experiments With Queries Over Encrypted  

E-Print Network [OSTI]

Appears in Secure Data Management: Second VLDB Workshop--SDM 2005, Lecture Notes in Computer which data was queried. The idea behind PIR is to replicate the data among several non that no server will learn the whole query by itself. Chor et al [4] prove that PIR with a single server can only

Schoenmakers, Berry

389

Physics Department Management Review  

E-Print Network [OSTI]

ESSH Committee and Work Planning Security Cyber Security Accident and Incident Management was distributed to the ESSH Committee, Group Leaders, Group Safety Coordinators, and Line Management #12;Areas

Homes, Christopher C.

390

Bachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis, 2014-2015  

E-Print Network [OSTI]

Clinical Practice HLTHST 431 Quality Issues in Health Care HLTHST 437 Health Information ManagementBachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis BIOL 192 or BIOL 228 HLTHST 101 Medical Terminology HLTHST 202 Health Delivery Systems HLTHST 215

Barrash, Warren

391

Bachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis, 2012-2013  

E-Print Network [OSTI]

Practice HLTHST 431 Quality Issues in Health Care HLTHST 437 Health Information Management ClinicalBachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis BIOL 192 or BIOL 228 4 HLTHST 101 Medical Terminology 3 HLTHST 202 Health Delivery Systems 3 HLTHST 215

Barrash, Warren

392

Bachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis, 2013-2014  

E-Print Network [OSTI]

Clinical Practice HLTHST 431 Quality Issues in Health Care HLTHST 437 Health Information ManagementBachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis BIOL 192 or BIOL 228 HLTHST 101 Medical Terminology HLTHST 202 Health Delivery Systems HLTHST 215

Barrash, Warren

393

Department of Management Science & Information System. Rutgers Business SchoolNewark and New Brunswick  

E-Print Network [OSTI]

. Department of Management Science & Information System. Rutgers Business School颅Newark and New of Management Science and Information Systems of Rutgers Business School 颅 Newark and New Brunswick invites of Rutgers, the State University of New Jersey, which is a vibrant public research university. The Rutgers

Lin, Xiaodong

394

Department of Management Science & Information System. Rutgers Business SchoolNewark and New Brunswick  

E-Print Network [OSTI]

. Department of Management Science & Information System. Rutgers Business School颅Newark and New of Management Science and Information Systems of Rutgers Business School 颅 Newark and New Brunswick invites is a vibrant public research university. The Rutgers Business School is located in two campuses: Newark and New

Lin, Xiaodong

395

Office of Quality Management  

Broader source: Energy.gov [DOE]

The Office of Quality Management develops and interprets Government-wide policies and procedures and conducts training to ensure the accurate identification of information and documents that must be classified or controlled under statute or Executive order to protect the national security and controlled unclassified Official Use Only information for the effective operation of the Government.

396

Trends in Energy Management Technology - Part 4: Review ofAdvanced Applications in Energy Management, Control, and InformationSystems  

SciTech Connect (OSTI)

In this article, the fourth in a series, we provide a review of advanced applications in Energy Management, Control, and Information Systems (EMCIS). The available features for these products are summarized and analyzed with regard to emerging trends in EMCIS and potential benefits to the Federal sector. The first article [1] covered enabling technologies for emerging energy management systems. The second article [2] serves as a basic reference for building control system (BCS) networking fundamentals and includes an assessment of current approaches to open communications. The third article [3] evaluated several products that exemplify the current state of practice in EMCIS. It is important for energy managers in the Federal sector to have a high level of knowledge and understanding of these complex energy management systems. This series of articles provides energy practitioners with some basic informational and educational tools to help make decisions relative to energy management systems design, specification, procurement, and energy savings potential.

Yee, Gaymond; Webster, Tom

2003-08-01T23:59:59.000Z

397

The encryption requirement can be waived for certain circumstances. Contact the Chief Information Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO.  

E-Print Network [OSTI]

' Information Technology policies require that any mobile device containing institutional data must be encrypted Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO. This directive Information Technology Appropriate Use Policy Colorado School of Mines Administrative Data Policy Mines

398

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

399

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

400

Design and implementation of a departmental information management system  

E-Print Network [OSTI]

Management System (DBMS); 4. logical design; 5. physical design and 6. implementation. The following section brie y walks through each step [5]. The goals of the requirements analysis (Step 1) are to determine the data re- quirements of the database in terms... program, a degree program involves di erent documents. A Database Management System (DBMS) is computer software designed for the purpose of managing databases. Typical examples of DBMSs include Oracle, Microsoft SQL Server, and MySQL. Step 3 involves...

Xie, Dawen

2009-05-15T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Applying Data Mining Techniques to Address Disaster Information Management Challenges on Mobile Devices  

E-Print Network [OSTI]

Applying Data Mining Techniques to Address Disaster Information Management Challenges on Mobile a collaborative solution on a mobile platform using advanced data mining and information retrieval techniques.8 [Database Applications]: Data mining; H.3.3 [Information Search and Retrieval]: Clustering; H.3.5 [Online

Chen, Shu-Ching

402

Management of Los Alamos National Laboratory's Cyber Security Program, IG-0880  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement ControlsVHTRManagement

403

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

404

Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.6  

SciTech Connect (OSTI)

Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.6

Downing, Timothy R.; Fangman, Patricia M.; Homer, Brian J.; Johnson, Daniel M.; Johnson, Ranata L.; Johnson, Sharon M.; Millard, W. David; Stoops, Lamar R.; Wood, Blanche M.

1999-03-05T23:59:59.000Z

405

29.01.03.M1.09 Information Resources Incident Management Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

likelihood that security incidents could be propagated to other systems beyond departmental control, system, process, store, retrieve, display, and transmit information or data. SIRS Security Incident Reporting follow System Regulation 10.02.01, Control of Fraud, Waste and Abuse. 2.6 If there is a substantial

406

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

407

Design of a digital dissertation information management system  

E-Print Network [OSTI]

Gobinda G. Chowdhury,G.G.C. Program: Electronic Library and Information Systems Volume 36 pp 152-165

Gobinda G.; Chowdhury, G.G.C.; Program: Electronic Library and Information Systems Volume 36 pp 152-165 [More Details

408

Generalized Information Architecture for Managing Requirements in IBM?s Rational DOORS(r) Application.  

SciTech Connect (OSTI)

When a requirements engineering effort fails to meet expectations, often times the requirements management tool is blamed. Working with numerous project teams at Sandia National Laboratories over the last fifteen years has shown us that the tool is rarely the culprit; usually it is the lack of a viable information architecture with well- designed processes to support requirements engineering. This document illustrates design concepts with rationale, as well as a proven information architecture to structure and manage information in support of requirements engineering activities for any size or type of project. This generalized information architecture is specific to IBM's Rational DOORS (Dynamic Object Oriented Requirements System) software application, which is the requirements management tool in Sandia's CEE (Common Engineering Environment). This generalized information architecture can be used as presented or as a foundation for designing a tailored information architecture for project-specific needs. It may also be tailored for another software tool. Version 1.0 4 November 201

Aragon, Kathryn M.; Eaton, Shelley M.; McCornack, Marjorie T.; Shannon, Sharon A.

2014-12-01T23:59:59.000Z

409

ITL BULLETIN FOR NOVEMBER 2010 THE EXCHANGE OF HEALTH INFORMATION: DESIGNING A SECURITY  

E-Print Network [OSTI]

is adequately addressed throughout the system development life cycle, and that data protection mechanisms. This approach involves addressing the protection of health information throughout the system development life cycle, and applying protective mechanisms, including contingency and disaster recovery planning

410

Managing perceptions of information overload in computer-mediated communication  

E-Print Network [OSTI]

difficulties on students? learning in online discussions, and (c) to identify students? strategies for avoiding or managing those difficulties in order to engage in quality learning. Interviews with students and computer conferencing transcripts were analyzed...

Chen, Chun-Ying

2005-02-17T23:59:59.000Z

411

MANAGEMENT INFORMATION SYSTEMS What can I do with this major?  

E-Print Network [OSTI]

institutions Insurance companies Consulting firms Manufacturers Computer companies Telecommunications companies Retailers Healthcare organizations Hotels and restaurants Entertainment companies Environmental management, government and non- governmental organizations including: Financial institutions Insurance companies

Hemmers, Oliver

412

Michael N. Katehakis Department of Management Science & Information Systems  

E-Print Network [OSTI]

sam- pling", (with Govindarajulu Z.) published in a special volume of the American Journal), New Jersey, Professor, 1989 - present Taught courses on business analytics, stochastic models in supply chain management, stochastic pro- cesses, data models and decisions, deterministic models

413

Risk-informed incident management for nuclear power plants  

E-Print Network [OSTI]

Decision making as a part of nuclear power plant operations is a critical, but common, task. Plant management is forced to make decisions that may have safety and economic consequences. Formal decision theory offers the ...

Smith, Curtis Lee, 1966-

2002-01-01T23:59:59.000Z

414

Exploring Volunteered Geographic Information (VGI) for Emergency Management: Toward a Wiki GIS Framework  

E-Print Network [OSTI]

The past three years have witnessed unprecedented growth of user-generated volunteered geographic information (VGI) on the Web. Although scholars, decision makers, and citizens have recognized the potential value of VGI in emergency management...

Xu, Chen

2011-10-21T23:59:59.000Z

415

ISSIGreviewProject Management Institute--Information Systems Specific Interest Group Fourth Quarter 2000  

E-Print Network [OSTI]

2000 Volume 10, Number 4 Supporting Project Management in an Information Systems Environment PMI & SIG News:PMI & SIG News:PMI & SIG News:PMI & SIG News:PMI & SIG News: ISSIG Communications Update

416

Deactivation & Decommissioning Knowledge Management Information Tool (D&D KM-IT)  

Broader source: Energy.gov [DOE]

The Deactivation and Decommissioning Knowledge Management Information Tool (D&D KM-IT) serves as a centralized repository providing a common interface for all D&D related activities.

417

Knowledge Discovery, Knowledge Management and Enterprise-Wide Information Technology Tools Final Report  

SciTech Connect (OSTI)

A final report on an ORNL task to establish a knowledge discovery and management tool to retrieve and recommend information from existing S&T documents for the Office of Naval Research Global.

Patton, Robert M [ORNL; Symons, Christopher T [ORNL; Gorman, Bryan L [ORNL; Treadwell, Jim N [ORNL

2012-04-01T23:59:59.000Z

418

Potential use of electronic information for natural resource management by private landowners in Texas  

E-Print Network [OSTI]

A mail survey of Texas' private landowners was conducted in the fall of 1996 to assess the potential use of electronic information sources as a tool for natural resource management. Eight hundred private landowners in rural communities were asked...

Hays, Amy E

2012-06-07T23:59:59.000Z

419

Nevada National Security Site 2012 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site  

SciTech Connect (OSTI)

This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2012 results. During 2012, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Groundwater samples were collected at UE5PW-1, UE5PW-2, and UE5PW-3 on March 21, August 7, August 21, and September 11, 2012, and static water levels were measured at each of the three pilot wells on March 19, June 6, August 2, and October 15, 2012. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Final results from samples collected in 2012 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

NSTec Environmental Management

2013-02-11T23:59:59.000Z

420

Nevada National Security Site 2010 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site  

SciTech Connect (OSTI)

This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2010 results. During 2010, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 10 and August 10, 2010; at UE5PW-2 on March 10, August 10, and August 25, 2010; and at UE5PW-3 on March 31, August 10, and August 25, 2010. Static water levels were measured at each of the three pilot wells on March 1, April 26, August 9, and November 9, 2010. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Results from all samples collected in 2010 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

NSTec Environmental Management

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Information Management | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial CarbonArticlesHumanJuneDocumentingFermiGeorgeHerbert

422

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses in length. Admission to the Faculty may occur at the end of Year One. Students are required to have completed the following  

E-Print Network [OSTI]

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses completion of a recognized degree from an English-language university. BachelorofManagement ManagementInformationSystems 4090 - Management Policy and Strategy Management 4840 - Systems Analysis Management 4841 - Systems

Seldin, Jonathan P.

423

Emergency Management Concepts, Existing Guidance, and Changes  

Broader source: Energy.gov [DOE]

Presenter: David Freshwater, Emergency Management Specialist, Office of Emergency Management, National Nuclear Security Administration

424

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

425

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

426

Special Analysis of the Area 3 Radioactive Waste Management Site at the Nevada National Security Site, Nye County, Nevada  

SciTech Connect (OSTI)

This report describes the methods and results of a special analysis (SA) of the Area 3 Radioactive Waste Management Site (RWMS) on the Nevada National Security Site (NNSS). The purpose of the SA is to determine if the approved performance assessment (PA) and composite analysis (CA) (Shott et al., 2001) remain valid. The Area 3 RWMS PA and CA were prepared as a single document and received conditional approval on October 6, 1999. A conditional Disposal Authorization Statement (DAS) for the Area 3 RWMS was issued on October 20, 1999. Since preparation of the approved PA and CA, new information and additional environmental monitoring data have been used to update the PA and CA. At the same time, continual advancements in computer processors and software have allowed improvement to the PA and CA models. Annual reviews of the PA and CA required by U.S. Department of Energy (DOE) Order DOE O 435.1 have documented multiple changes occurring since preparation of the PA and CA. Potentially important changes include: Development of a new and improved baseline PA and CA model implemented in the probabilistic GoldSim simulation platform. A significant increase in the waste inventory disposed at the site. Revision and updating of model parameters based on additional years of site monitoring data and new research and development results. Although changes have occurred, many important PA/CA issues remain unchanged, including the site conceptual model, important features, events, and processes, and the points of compliance. The SA is performed to document the current status of the PA/CA model and to quantitatively assess the impact of cumulative changes on the PA and CA results. The results of the SA are used to assess the validity of the approved PA/CA and make a determination if revision of the PA or CA is necessary. The SA was performed using the Area 3 RWMS, version 2.102, GoldSim model, the current baseline PA/CA model. Comparison of the maximum SA results with the PA performance objectives indicates that there continues to be a reasonable expectation of compliance. The resident exposure scenario was evaluated for compliance with the air pathway and all-pathways annual total effective dose (TED) performance objectives. The maximum mean air pathway TED, 7E-6 millisievert (mSv) at 1,000 years (y) has decreased relative to the approved PA and is significantly less than the 0.1 mSv limit. The maximum mean all-pathways annual TED, 7E-5 mSv at 1,000 y has increased but remains a small fraction of the 0.25 mSv limit. The SA maximum mean radon-222 (222Rn) flux density, 0.03 becquerel per square meter per second (Bq m-2 s-1), has increased relative to the PA results but is significantly less than the 0.74 Bq m-2 s-1 limit. The SA results continue to support a conclusion that the disposed waste inventory is protective of intruders and groundwater resources. The maximum mean intruder TED, 0.01 mSv for an acute construction scenario at the U-3ah/at disposal unit, was less than the 5 mSv performance measure. Site monitoring data and research results continue to support a conclusion that a groundwater pathway will not exist within the 1,000 y compliance period. Projected releases to the environment are a small fraction of the performance objectives. Cost-effective options for reducing releases further are unlikely to exist. Therefore, releases from the Area 3 RWMS are judged to be as low as reasonably achievable. Comparison of the maximum CA result with the 0.3 mSv CA dose constraint indicates that no action is required to reduce the dose from the Area 3 RWMS and all interacting sources of residual radioactive contamination. The SA maximum mean CA annual TED, 0.02 mSv at 1,000 y, has increased from the approved CA result but remains less than 10% of the dose constraint. The CA TED continues to be due predominantly to inhalation of plutonium-239 resuspended from soils contaminated by nuclear weapons tests conducted near the Area 3 RWMS. The SA results estimated with the Area 3 RWMS version 2.102 model indicate that changes to the PA and CA do not

National Security Technologies, LLC, Environmental Management

2012-09-30T23:59:59.000Z

427

BA (Hons) Business Management (In-Company) Degree Information for Prospective Sponsoring Companies  

E-Print Network [OSTI]

BA (Hons) Business Management (In-Company) Degree Information for Prospective Sponsoring Companies) Business Management (In-Company) degree, which is based at Nottingham Business School, is aimed of the programme is full time at the Business School but students then spend the next two years in a company

Evans, Paul

428

Cloud Computing as a Tool to Secure and Manage Information Flow in Swedish Armed Forces Networks.  

E-Print Network [OSTI]

??In the last few years cloud computing has created much hype in the IT world. It has provided new strategies to cut down costs and (more)

Ali, Muhammad

2012-01-01T23:59:59.000Z

429

Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1,2  

E-Print Network [OSTI]

, pricing, and demand among utility providers and consumers. While the smart meter infrastructure the events streaming from smart meters through the smart grid, to meaningful analysis and feedback for these decisions comes from diverse sources: smart meters that report near real-time power usage and quality

Prasanna, Viktor K.

430

Nevada National Security Site 2011 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site  

SciTech Connect (OSTI)

This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2011 results. During 2011, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 8, August 2, August 24, and October 19, 2011; at UE5PW-2 on March 8, August 2, August 23, and October 19, 2011; and at UE5PW-3 on March 8, August 2, August 23, and October 19, 2011. Static water levels were measured at each of the three pilot wells on March 1, June 7, August 1, and October 17, 2011. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Initial total organic carbon and total organic halides results for samples collected in August 2011 were above previous measurements and, in some cases, above the established investigation limits. However, after field sample pumps and tubing were disinfected with Clorox solution, the results returned to normal levels. Final results from samples collected in 2011 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

NSTec Environmental Management

2012-02-27T23:59:59.000Z

431

UAV/UAS path planning for ice management information gathering.  

E-Print Network [OSTI]

??The key objective of this work is the proposition of the path planning strategy for unmanned aerial vehicle (UAV) intended for information gathering in Arctic (more)

Stalmakou, Artsiom

2011-01-01T23:59:59.000Z

432

E-Print Network 3.0 - assessment information system Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

The ISAAC system provides... 29.01.99.M1.26 Information Resources - Information Security Risk Assessment Reviews Page 1 of 3... which adequately provides management with assurance...

433

International Journal of Information Security manuscript No. (will be inserted by the editor)  

E-Print Network [OSTI]

Ding 路 Yanjiang Yang 路 Robert H. Deng 路 Shuhong Wang A New Hardware-assisted PIR with O(n) Shuffle Cost information re- trieval (PIR) was first formalized by Chor et. al, various constructions have been proposed on practical PIR schemes. In this paper, we propose a hardware-assisted PIR scheme with a novel shuffle

Ding, Xuhua

434

Secure Group-based Information Sharing in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

efforts such as joint intrusion detection. As an example, Phoenix Joint Terrorism Task Forces have information. Therefore, in an integrated ad hoc network, group-based data access must be controlled through. First, even with Elliptic Curve Cryptography, symmetric encryption still has its unique advantages

Wang, Yu

435

FTCP Site Specific Information - Office of Environmental Management |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeat PumpRecord ofESPCofConstruction Management14,2DepartmentManagement |Department of

436

Security and Use Control of Nuclear Explosives and Nuclear Weapons (Informational Purposes Only)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This draft has been scheduled for final review before the Directives Review Board on 3-5-15. All major comments and concerns should be provided to your DRB representative, following your organization process. If you do not know who your representative is, please see the list of DRB members at https://www.directives.doe.gov/beta/references/directives-review-board. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-1014). All major comments and concerns should be submitted by COB 3-3-15.

2015-02-24T23:59:59.000Z

437

Forms Management Guide for use with DOE O 200.1, Information Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides guidance for the development, analysis, approval, and management of forms in the U.S. Department of Energy (DOE). No cancellations.

2000-05-08T23:59:59.000Z

438

2014 Internship Syllabus Page 1 of 4 MIS 353: Internship in Management Information Systems  

E-Print Network [OSTI]

2014 Internship Syllabus Page 1 of 4 MIS 353: Internship in Management Information Systems 2014 for reflection while you perform a professional internship that enhances your ability to achieve your career. Section 2. Contact Information Course website: http://www.mccombs.utexas.edu/BBA/Career-Services/Internship

Ghosh, Joydeep

439

Current Regulations and Guidance - New Approaches for Risk-Informed Low-Level Radioactive Waste Management  

SciTech Connect (OSTI)

This paper presents the historical foundations and future challenges for commercial low-level radioactive waste (LLRW) management in the United States. LLRW has been managed at government facilities since the beginning of the nuclear age and in the commercial sector since the early 1960's. Over the intervening years many technical, management and regulatory changes have occurred. Significant progress has been made in waste form, waste packaging and in recognizing radionuclides important to performance of disposal technologies and disposal facilities. This presentation will examine approaches using existing regulations and risk-informed approaches to improve guidance, licensing and management of LLRW. (authors)

Ryan, M.T. Ph.D.; CHP [Advisory Committee on Nuclear Waste and Materials, U.S. Nuclear Regulatory Commission, Washington, D.C. (United States)

2008-07-01T23:59:59.000Z

440

Management of Dynamic Location Information O. Wolfson1,2,  

E-Print Network [OSTI]

DBMS. The database stores the information about each moving object, including its plan of motion-View GIS. It uses the Informix DBMS on Unix, and Oracle on MS/Windows. We will demonstrate the following

Illinois at Chicago, University of

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

442

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

443

Managerial information behaviour: Relationships among Total Quality Management orientation, information use environments, and managerial roles  

E-Print Network [OSTI]

production process and customer information Low Total Quality Learning: continuous innovation and learning: exploration

Simard, C; Rice, Ronald E

2006-01-01T23:59:59.000Z

444

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

445

Information management fiscal year 1996 site support program plan, WBS 6.4. Revision 1  

SciTech Connect (OSTI)

In the recent past, information resource management (IRM) was a neatly separable component of the overall DOE mission, concerned primarily with procuring and implementing automatic data processing (ADP) systems. As the DOE missions have shifted from producing product to managing processes, those clear lines have blurred. Today, IRM is firmly embedded in all aspects of the DOE mission. BCS Richland, Inc., (BCSR) provides IRM for the Hanford Site. The main focus in executing this mission is to meet customer goals by providing high-quality, timely, and cost-effective electronic communication, computing, and information services. Information resources provide the US Department of Energy, Richland Operations Office (RL) and the Hanford Site contractors the ability to generate, store, access, and communicate information quickly, reliably, and cost effectively. BCSR plans, implements, and operates electronic communication, computing and information management systems that enable effective operation of the Hanford Site. Five strategic initiatives to encompass the vision provide guidance and focus to the information technology (IT) direction for developing the BCSR program plan. These strategic initiatives are the program vision and are as follows: primary focus; fast response; accessible information; world class information management infrastructure; powerful desktop. The business directions that guide the development of the BCSR Program Plan are: (1) emphasize providing cost-effective and value-added communication, computing, and information systems products and services to the Site missions; (2) strengthen the alignment of products and services with Site projects and programs and eliminate duplications Sitewide; (3) focus on the effective resolution of critical Site information management (IM) issues.

NONE

1995-09-01T23:59:59.000Z

446

Information basis for developing comprehensive waste management system-US-Japan joint nuclear energy action plan waste management working group phase I report.  

SciTech Connect (OSTI)

The activity of Phase I of the Waste Management Working Group under the United States - Japan Joint Nuclear Energy Action Plan started in 2007. The US-Japan JNEAP is a bilateral collaborative framework to support the global implementation of safe, secure, and sustainable, nuclear fuel cycles (referred to in this document as fuel cycles). The Waste Management Working Group was established by strong interest of both parties, which arise from the recognition that development and optimization of waste management and disposal system(s) are central issues of the present and future nuclear fuel cycles. This report summarizes the activity of the Waste Management Working Group that focused on consolidation of the existing technical basis between the U.S. and Japan and the joint development of a plan for future collaborative activities. Firstly, the political/regulatory frameworks related to nuclear fuel cycles in both countries were reviewed. The various advanced fuel cycle scenarios that have been considered in both countries were then surveyed and summarized. The working group established the working reference scenario for the future cooperative activity that corresponds to a fuel cycle scenario being considered both in Japan and the U.S. This working scenario involves transitioning from a once-through fuel cycle utilizing light water reactors to a one-pass uranium-plutonium fuel recycle in light water reactors to a combination of light water reactors and fast reactors with plutonium, uranium, and minor actinide recycle, ultimately concluding with multiple recycle passes primarily using fast reactors. Considering the scenario, current and future expected waste streams, treatment and inventory were discussed, and the relevant information was summarized. Second, the waste management/disposal system optimization was discussed. Repository system concepts were reviewed, repository design concepts for the various classifications of nuclear waste were summarized, and the factors to consider in repository design and optimization were then discussed. Japan is considering various alternatives and options for the geologic disposal facility and the framework for future analysis of repository concepts was discussed. Regarding the advanced waste and storage form development, waste form technologies developed in both countries were surveyed and compared. Potential collaboration areas and activities were next identified. Disposal system optimization processes and techniques were reviewed, and factors to consider in future repository design optimization activities were also discussed. Then the potential collaboration areas and activities related to the optimization problem were extracted.

Nutt, M.; Nuclear Engineering Division

2010-05-25T23:59:59.000Z

447

Property:ManagingFieldOffice | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County,ContAddr2 Jump to:ManagingFieldOffice Jump to: navigation, search

448

INFORMATION: Special Report on "Management Challenges at the Department of Energy"  

SciTech Connect (OSTI)

Responsible for some of the Nation's most important and technically advanced missions, the Department of Energy faces an array of challenges that are more wide-ranging and complex than at any time in its history. While its origins can be largely traced to the Manhattan Project, the Department has evolved into a multi-faceted agency that encompasses a broad range of scientific, environmental, and national security activities. Since its creation under the Department of Energy Organization Act in 1977, the Department has shifted its emphasis and priorities over time as the energy and security needs of the Nation have changed. The Department has recently refocused these efforts, adding particular emphasis on the science and renewable energy components of its portfolio. In this regard, the Department has taken a lead role in the implementation and execution of the energy technology initiatives related to the American Recovery and Reinvestment Act of 2009 (Recovery Act). As a means of accomplishing these initiatives, the Department received a substantial increase in its annual appropriation, rising from nearly $25 billion in 2008 to approximately $34 billion in 2009 as a result of additional funding in the Department's loan program and numerous science, energy, and national security initiatives. In addition, the Department was provided more than $36 billion in Recovery Act funding to be used over a two to three year period. Further, the Department, through existing authorities and those expanded by the Recovery Act, has been authorized to provide more than $100 billion in loan guarantees for innovative, clean energy technologies. To accomplish its vital missions, the Department employs approximately 115,000 Federal and contractor personnel and manages assets valued at more than $189 billion, including the 17 national laboratories at the heart of its science program. On an annual basis, the Office of Inspector General is required to identify what it considers to be the most significant management challenges facing the Department. Our effort addresses new or emerging issues and evaluates the Department's progress in resolving previously identified challenges. The challenges identified by this process represent risks inherent in the Department's wide ranging and complex operations, as well as those related to problems with specific management processes. As noted in past reports, we recognize that often these challenges cannot be resolved in a single year and must, therefore, be addressed through a concentrated, persistent effort over time. Consistent with our mission, the overall goal is to focus attention on significant issues with the objective of working with Department managers to enhance the effectiveness of agency programs and operations. During the past year, the Department has taken a number of actions to promote its ongoing strategy of resolving the management challenges identified in our prior reports. There have been many notable advances. However, in our judgment, on the basis of the results of our work during the past year and other risk assement tools, the following management challenges remain for Fiscal Year (FY) 2010: Contract Administration; Cyber Security; Energy Supply; Environmental Cleanup; Safeguards and Security; and Stockpile Stewardship. As with a number of Federal agencies, the Department received an unprecedented infusion of funds as a result of the Recovery Act. These funds, along with the overarching goals set forth in the Act, were transformative in nature. On a positive note, the Department and its staff have been energized by the new and evolving programmatic initiatives resulting from the Recovery Act. However, as would be expected in an effort of this magnitude, the Departmnent has experienced significantly increased management stresses and strains, impacting virtually every program and operation. In fact, the essentially unavoidable burden placed on existing human capital and other resources has, in our judgment, affected the Department's ability to resolve its existing management challenges, a

None

2009-12-01T23:59:59.000Z

449

This extended abstract appeared in Proceedings of the 2006 ACM Symposium on Information, computer and communications security (AsiaCCS '06)  

E-Print Network [OSTI]

, however, have resulted in site security policy changes. Many sites are changing their security policies

Abdalla, Michel Ferreira

450

IBM Information Management Software Services FileNet P8 3.x to 4.x Upgrade/Transition Services  

E-Print Network [OSTI]

IBM Information Management Software Services FileNet P8 3.x to 4.x Upgrade/Transition Services adviser who understands your business needs and can successfully manage the transition. Information Management (IM) Lab Services is the experienced leader through which a successful ECM transition can

451

Evaluation Report on "The Department's Unclassified Cyber Security Program"  

SciTech Connect (OSTI)

Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

None

2009-10-01T23:59:59.000Z

452

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

453

Preproposal Conference & Site Tour | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Preproposal Conference & Site Tour | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

454

Infrastructure & Sustainability | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

& Sustainability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

455

Best Practices for the Security of Radioactive Materials  

SciTech Connect (OSTI)

This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

Coulter, D.T.; Musolino, S.

2009-05-01T23:59:59.000Z

456

Incubator Management GmbH | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:PhotonHolyNameInformationsourceenhancedIncognito-Incubar

457

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

458

A Toolkit for Constraint Management in Heterogeneous Information Systems \\Lambda  

E-Print Network [OSTI]

to monitor and enforce distributed integrity constraints in loosely coupled heterogeneous information systems in such environments. Our framework is used to describe (1) interfaces provided by a database for the data items integrity constraints over data that is stored in a collec颅 tion of loosely coupled heterogeneous

Chawathe, Sudarshan S.

459

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

460

Ground Water Management District Rules | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to: navigation,Ohio:Greer County is a county inAl., 1979) |Haar,Management District Rules

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

USAID-Forestry Conflict Management Training | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExplorationUT-gTagusparkCalculator Jump to: navigation, search ToolConflict Management

462

Active Network Management (Smart Grid Project) | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWaterBrasil Jump to: navigation, searchAccionaAcruxManagement (Smart

463

Sustainable Groundwater Management Act of 2014 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty LtdSteen,Ltd Jump to: navigation, search Name: Sustainable EnergyManagement Act

464

2010 Annual Summary Report for the Area 3 and Area 5 Radioactive Management Sites at the Nevada National Security Site, Nye County, Nevada  

SciTech Connect (OSTI)

The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 Radioactive Waste Management Site (RWMS) Performance Assessments (PAs) and Composite Analyses (CAs) in fiscal year (FY) 2010. This annual summary report presents data and conclusions from the FY 2010 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs.

NSTec Environmental Management

2011-03-01T23:59:59.000Z

465

E-Print Network 3.0 - achieving cooperative security Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Collection: Chemistry ; Biotechnology 7 Secure Business Process Management: A Roadmap Thomas Neubauer, Markus Klemen, Stefan Biffl Summary: Secure Business Process...

466

Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.3  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the (Pacific Northwest National Laboratory) (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. 91 This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login, privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment.

Burford, M.J.; Burnett, R.A.; Downing, T.R. [and others

1996-12-01T23:59:59.000Z

467

Research and information needs for management of oil shale development  

SciTech Connect (OSTI)

This report presents information and analysis to assist BLM in clarifying oil shale research needs. It provides technical guidance on research needs in support of their regulatory responsibilities for onshore mineral activities involving oil shale. It provides an assessment of research needed to support the regulatory and managerial role of the BLM as well as others involved in the development of oil shale resources on public and Indian lands in the western United States.

Not Available

1983-05-01T23:59:59.000Z

468

Montana Streamside Management Zone Law Webpage | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte3 Climate Zone Subtype A.InformationGuide Webpage Jump

469

Idaho DEQ Waste Management and Permitting Webpage | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to: navigation,Ohio:GreerHiCalifornia:ISI Solar Jump to:InformationOpen|Tanks

470

India-Natural Resource Management Plan | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpInc Place: Eden Prairie, Minnesota Zip: 55344

471

Development of a Carbon Management Geographic Information System (GIS) for the United States  

SciTech Connect (OSTI)

In this project a Carbon Management Geographical Information System (GIS) for the US was developed. The GIS stored, integrated, and manipulated information relating to the components of carbon management systems. Additionally, the GIS was used to interpret and analyze the effect of developing these systems. This report documents the key deliverables from the project: (1) Carbon Management Geographical Information System (GIS) Documentation; (2) Stationary CO{sub 2} Source Database; (3) Regulatory Data for CCS in United States; (4) CO{sub 2} Capture Cost Estimation; (5) CO{sub 2} Storage Capacity Tools; (6) CO{sub 2} Injection Cost Modeling; (7) CO{sub 2} Pipeline Transport Cost Estimation; (8) CO{sub 2} Source-Sink Matching Algorithm; and (9) CO{sub 2} Pipeline Transport and Cost Model.

Howard Herzog; Holly Javedan

2009-12-31T23:59:59.000Z

472

Web-based feedback system: the life cycle management as continuous maintenance of apartment facility information  

E-Print Network [OSTI]

to make it efficient. A database requires a database management system (DBMS), a set of computer programs for organizing the information in a database, to manage its structure and control access to the data stored in the database [9]. A DBMS supports... the structuring of the database in a standard format and provides tools for data input, verification, storage, retrieval, query, and manipulation. According to Ramakishman [26], DBMS is software, designed to assist in maintaining and utilizing large collection...

Jeong, Jin Su

2006-10-30T23:59:59.000Z

473

Contacts for Information Collection Management | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User GroupInformationE-Gov Contacts for E-Gov LeAnnProject

474

Macquarie Funds Management USA Inc | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpIncMAKGalway Bay IEOWCCatcher.pngWavemill <MNMabank,form View

475

INFORMATION ON THE SYSTEM FOR AWARD MANAGEMENT (SAM)  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietip sheetK-4InFinding InvestigationofINFORMATION ON THE SYSTEM FOR

476

Information and Records Management Transition Guidance | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomentheATLANTA,Fermi NationalBusiness PlanPosting Thomas F.NeedsEnergy Information

477

Utah Nonpoint Source Pollution Management Plan | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformation UC 19-6-401Upson County,MonkeymosaicCommerce JumpTank

478

NA IM- Associate Administrator for Information Management & Chief  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of the Yucca0 NationalJ Page i|Information Officer |

479

National Forest Management Act of 1976 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's HeatMexico: EnergyMithun JumpMuscoy,Jump9 CaseNatEl Jump to:NCPVNational

480

Network-Driven Demand Side Management Website | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's HeatMexico: EnergyMithunCenter Jump to:2 Rules,NellisAntilles:

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

New England Energy Management Inc | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's HeatMexico: EnergyMithunCenter Jump to:2 JumpCanaan,Ecology Jump to: Name:Inc

482

ADEQ Hazardous Waste Management website | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights,Information Of TheFixed Logo: ACORE Name:Forms

483

ADEQ Managing Hazardous Waste Handbook | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights,Information Of TheFixed Logo: ACORE

484

ASM Asset Management DTVM SA | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights,InformationWind EnergyPublic UtilitiesTechnology

485

Hara Environmental and Energy Management Solution | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:Photon Place:Net JumpStrategy |Hammerfest Strom UKHara

486

KlimaINVEST Management GmbH | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpInc Place:Keystone Clean Air Jump to:KingKirkwood

487

Secure Multiparty Computation Based Privacy Preserving Smart Metering System  

E-Print Network [OSTI]

Secure Multiparty Computation Based Privacy Preserving Smart Metering System Cory Thoma Information Ave. Pittsburgh, PA 15213 Email: {tcui,franzf}@ece.cmu.edu Abstract--Smart metering systems provide privacy preserving protocol for smart meter based load management. Using SMC and a proper designed

Franchetti, Franz

488

Addendum to CSUIT Security Policy Warner College of Natural Resources  

E-Print Network [OSTI]

Addendum to CSUIT Security Policy for Warner College of Natural Resources Version 1.06 - July 2010 information technologies, as well as a growing need to protect the computing resources at Colorado State unique cases will be dealt with on a case by case basis by the College of Natural Resources IT Manager

489

Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.2  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS system package. System administrators, database administrators, and general users can use this guide to install, configure, and maintain the FEMIS client software package. This document provides a description of the FEMIS environment; distribution media; data, communications, and electronic mail servers; user workstations; and system management.

Burford, M.J.; Burnett, R.A.; Curtis, L.M. [and others

1996-05-01T23:59:59.000Z

490

Collaboration, Automation, and Information Management at Hanford High Level Radioactive Waste (HLW) Tank Farms  

SciTech Connect (OSTI)

Washington River Protection Solutions (WRPS), operator of High Level Radioactive Waste (HLW) Tank Farms at the Hanford Site, is taking an over 20-year leap in technology, replacing systems that were monitored with clipboards and obsolete computer systems, as well as solving major operations and maintenance hurdles in the area of process automation and information management. While WRPS is fully compliant with procedures and regulations, the current systems are not integrated and do not share data efficiently, hampering how information is obtained and managed.

Aurah, Mirwaise Y.; Roberts, Mark A.

2013-12-12T23:59:59.000Z

491

2015 DOE Safety and Security Enforcement Workshop - Badging and...  

Office of Environmental Management (EM)

2015 DOE Safety and Security Enforcement Workshop - Badging and Facility Information 2015 DOE Safety and Security Enforcement Workshop - Badging and Facility Information January...

492

TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH  

SciTech Connect (OSTI)

The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

Lee, Hsien-Hsin S

2010-05-11T23:59:59.000Z

493

Radioactive Waste Management information for 1994 and record-to-date  

SciTech Connect (OSTI)

This document, Radioactive Waste Management Information for 1994 and Record-To-Date, contains computerized radioactive waste data records from the Idaho National Engineering Laboratory (INEL). Data are compiled from information supplied by the US Department of Energy (DOE) contractors. Data listed are on airborne and liquid radioactive effluents and solid radioactive waste that is stored, disposed, and sent to the INEL for reduction. Data are summarized for the years 1952 through 1993. Data are detailed for the calendar year 1994.

French, D.L.; Lisee, D.J.; Taylor, K.A.

1995-07-01T23:59:59.000Z

494

Finders/keepers: A longitudinal study of people managing information scraps in a micro-note tool  

E-Print Network [OSTI]

Mainstream PIM tools capture only a portion of the information that people need to manage. Many information scraps seem to exist that don't make their way into these tools, instead being relegated to sticky notes, text ...

Van Kleek, Max G.

495

Migrating the facility profile information management system into the world wide web  

SciTech Connect (OSTI)

The Department of Energy - Office of Special Projects and Argonne National Laboratory (ANL), along with the Department of Energy - office of Scientific and Technical Information have previously designed and implemented the Environment, Safety and Health Facility Profile Information Management System (FPIMS) to facilitate greater efficiency in searching, analyzing and disseminating information found within environment, safety and health oversight documents. This information retrieval based system serves as a central repository for full-text electronic oversight documents, as well as a management planning and decision making tool that can assist in trend and root cause analyses. Continuous improvement of environment, safety and health programs are currently aided through this personal computer-based system by providing a means for the open communication of lessons learned across the department. Overall benefits have included reductions in costs and improvements in past information management capabilities. Access to the FPIMS has been possible historically through a headquarters-based local area network equipped with modems. Continued demand for greater accessibility of the system by remote DOE field offices and sites, in conjunction with the Secretary of Energy` s call for greater public accessibility to Department of Energy (DOE) information resources, has been the impetus to expand access through the use of Internet technologies. Therefore, the following paper will discuss reasons for migrating the FPIMS system into the World Wide Web (Web), various lessons learned from the FPIMS migration effort, as well as future plans for enhancing the Web-based FPIMS.

Kero, R.E.; Swietlik, C.E.

1994-09-01T23:59:59.000Z

496

Participative management in the elaboration and implementation of the OSUA information system  

E-Print Network [OSTI]

, the association has chosen to rely on an internationally recognized reference : ISO 9001: 2000. This reference1 Participative management in the elaboration and implementation of the OSUA information system and implementation of a monitoring system for mentally disabled users' pathways at all ages and in all situations

Paris-Sud XI, Universit茅 de

497

Idaho National Engineering Laboratory Nonradiological Waste Management Information for 1992 and record to date  

SciTech Connect (OSTI)

This document provides detailed data and graphics on airborne and liquid effluent releases, fuel oil and coal consumption, water usage, and hazardous and mixed waste generated for calendar year 1992. This report summarizes industrial waste data records compiled since 1971 for the Idaho National Engineering Laboratory (INEL). The data presented are from the INEL Nonradiological Waste Management Information System.

Randall, V.C.; Sims, A.M.

1993-08-01T23:59:59.000Z

498

Project Information Form Project Title Integrating Management of Truck and Rail Systems in Los Angeles  

E-Print Network [OSTI]

Project Information Form Project Title Integrating Management of Truck and Rail Systems in Los or organization) Volvo Research and Educational Foundation- $79,604.00 Total Project Cost $79,604.00 Agency ID of Research Project This project will develop models to optimize the balance of freight demand across rail

California at Davis, University of

499

Project Information Form Project Title Advanced Energy Management Strategy Development for Plug-in Hybrid  

E-Print Network [OSTI]

,365 Total Project Cost $58,365 Agency ID or Contract Number DTRT13-G-UTC29 Start and End Dates April 1, 2014Project Information Form Project Title Advanced Energy Management Strategy Development for Plug 颅 September 30, 2015 Brief Description of Research Project Plug-in hybrid vehicles (PHEVs) have great

California at Davis, University of

500

Project Information Form Project Title Managing Roadway Systems to Reduce GHG Emissions and Improve  

E-Print Network [OSTI]

or organization) $25,217 Total Project Cost $25,217 Agency ID or Contract Number DTRT13-G-UTC29 Start and EndProject Information Form Project Title Managing Roadway Systems to Reduce GHG Emissions and Improve Dates 4/1/14 颅 3/30/15 Brief Description of Research Project There have been a variety of traffic

California at Davis, University of