National Library of Energy BETA

Sample records for interest security company

  1. National Interest Security Company NISC Formerly Technology Management...

    Open Energy Info (EERE)

    Interest Security Company NISC Formerly Technology Management Services TMS Inc Jump to: navigation, search Name: National Interest Security Company (NISC) (Formerly Technology &...

  2. The Inverse Problem for Derivative Securities of Interest Rate

    E-Print Network [OSTI]

    2008-02-02

    May 26, 2000 ... Market price for risk of interest rate reflects the close relation between risk and yield of securities dependent on interest rate. An inverse problem.

  3. Farm Tractors in Kansas: How to Perfect a Security Interest

    E-Print Network [OSTI]

    Johnstun, Aaron J.; Ware, Stephen J.

    2009-01-01

    certificate-of-title statute, a different rule applies. For example, in all fifty states, motor vehicles are subject to a certificate- of-title statute. 8 The UCC provides that security interests in such collateral are perfected not by filing a financing... security interest in a motor vehicle be noted on the certificate of title. 11 Accordingly, the filing of a financing statement is not necessary or effective to perfect a security interest in a Missouri motor vehicle. By contrast, notation...

  4. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  5. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University networks and data products. But as technology becomes more complex, security threats also become more

  6. Protection and Control of Safeguards and Security Interests

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    To establish policy, responsibilities, and authorities for the protection and control of safeguards and security interests. Cancels DOE O 5632.1B, DOE O 5632.2A, DOE O 5632.5, DOE O 5632.6, DOE O 5632.9A, DOE O 5632.11, DOE O 5635.1A, DOE O 5635.2B, DOE O 5635.3. Canceled by DOE O 473.1

  7. Packaging and Transfer of Materials of National Security Interest Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-29

    This Technical Manual establishes requirements for operational safety controls for onsite operations and provides Department of Energy (DOE) technical safety requirements and policy objectives for development of an Onsite Packaging and Transfer Program, pursuant to DOE O 461.1A, Packaging and Transfer or Transportation of Materials of National Security Interest. The DOE contractor must document this program in its Onsite Packaging and Transfer Manual/Procedures. Admin Chg 1, 7-26-05. Certified 2-2-07. Canceled by DOE O 461.2.

  8. National Interest Security Company NISC Formerly Technology Management

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPI Ventures Ltd Jump to: navigation,Naples,Development

  9. Packaging and Transportation for Offsite Shipment of Materials of National Security Interests

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-04-20

    The Order establishes requirements and responsibilities for ensuring the safety of packaging and transportation for offsite shipments of Materials of National Security Interest.

  10. The Inverse Problem for Derivative Securities of Interest Rate

    E-Print Network [OSTI]

    2008-02-02

    May 26, 2000 ... Following the general method for derivative security pricing 1], we get the partial differential equation for a zero-coupon bond in the form. @V.

  11. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  12. US statutes of general interest to safeguards and security officers. Revision 12/95

    SciTech Connect (OSTI)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. This document, BNL 52202, it titled, ``US Statutes of General Interest to Safeguards and Security Officers``, and is intended for use by officers.

  13. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Jornsten, Rebecka

    . The FBI may be able to help you determine if these contacts pose any risk to you or your company. Change unusual circumstances or noteworthy incidents to your security officer and to the FBI. Notifying the FBI and country threat assessments are available from the FBI upon request. Good security habits will help protect

  14. The role of a security strategy is to align company security and business goals, provide

    E-Print Network [OSTI]

    Fisher, Kathleen

    , and methodologies to assist you in building a complete unified information security program or individual elements's information security program meets its requirements across the board, it is vital to have one enterprise security strategy and one information security framework. Putting in a solid foundational program

  15. Packaging and Transfer or Transportation of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-29

    To establish requirements and responsibilities for the Transportation Safeguards System (TSS) packaging and transportation and onsite transfer of nuclear explosives, nuclear components, Naval nuclear fuel elements, Category I and Category II special nuclear materials, special assemblies, and other materials of national security interest. Cancels: DOE 5610.12 and DOE 5610.14.

  16. Packaging and Transfer or Transportation of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-04-26

    To establish requirements and responsibilities for offsite shipments of naval nuclear fuel elements, Category I and Category II special nuclear material, nuclear explosives, nuclear components, special assemblies, and other materials of national security interest. Cancels DOE O 461.1. Canceled by DOE O 461.1B and DOE O 461.2.

  17. Interest Rate Derivative Securities c 2005 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 772

    E-Print Network [OSTI]

    Lyuu, Yuh-Dauh

    Interest Rate Derivative Securities c 2005 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 772-White and the Seven Dwarfs" c 2005 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 773 Term Structure Fitting c 2005 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 774 That's an old besetting sin; they think

  18. DRAFT - DOE O 461.1C, Packaging and Transportation for Offsite Shipment of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    The Order establishes requirements and responsibilities for ensuring the safety of packaging and transportation for offsite shipments of Materials of National Security Interest.

  19. Packaging and Transportation for Offsite Shipment of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-20

    The purpose of this Order is to make clear that the packaging and transportation of all offsite shipments of materials of national security interest for DOE must be conducted in accordance with DOT and Nuclear Regulatory Commission (NRC) regulations that would be applicable to comparable commercial shipments, except where an alternative course of action is identified in this Order. Supersedes DOE O 461.1A.

  20. Packaging and Transportation for Offsite Shipment of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-01-05

    The Order establishes requirements and responsibilities for ensuring the safety of packaging and transportation for offsite shipments of Materials of National Security Interest. DOE Order 461.1C received a significant number of major and suggested comments the first time it was reviewed in RevCom. As a result of the number of comments received, the OPI have a second RevCom review. This revision of DOE O 461.1C incorporates changes which resulted from the comment resolution process of the initial draft.

  1. Packaging and Transportation for Offsite Shipment of Materials of National Security Interests

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-25

    The Order establishes requirements and responsibilities for ensuring the safety of packaging and transportation for offsite shipments of Materials of National Security Interest. DOE Order 461.1C received a significant number of major and suggested comments the first time it was reviewed in RevCom. As a result of the number of comments received, the OPI have a second RevCom review. This revision of DOE O 461.1C incorporates changes which resulted from the comment resolution process of the initial draft.

  2. Recommendations for Enhancing the U.S. Visa System to Advance America's Scientific and Economic Competitiveness and National Security Interests

    E-Print Network [OSTI]

    Knowles, David William

    Competitiveness and National Security Interests May 18, 2005 Following the terrorist attacks of September 11, 2001, national security, and higher education and scientific enterprises. These misperceptions must be dispelled, the U.S. government put in place new safeguards in the nation's visa system that made it extremely

  3. Bridging Aero and Auto CPS: Secure Software and Data Distribution* Krishna Sampigethaya, Walter Beck, Kristy Lane, Scott Lintelman (The Boeing Company),

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    Bridging Aero and Auto CPS: Secure Software and Data Distribution* Krishna Sampigethaya, Walter are those of the authors, and should not be interpreted as the views of The Boeing Company and Ford Motor

  4. Notice of Intent to Revise Department of Energy Order 461.1B, Packaging and Transportation for Offsite Shipment of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-01-15

    The purpose of this memorandum is to provide justification for the proposed revision of DOE O 461.1B, Packaging and Transportation for Offsite Shipment of Materials of National Security Interest, dated 12-16-2010, as part of the the quadrennial review and recertification as required by DOE O 251.1C, Departmental Directives Program.

  5. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  6. Shai Agassi's story of his evolving personal interest in energy issues, and the evolv-ing business plan of his electric vehicle company, Better Place, provides an impor-

    E-Print Network [OSTI]

    Kammen, Daniel M.

    plan of his electric vehicle company, Better Place, provides an impor- tant lens on the pace short-lived efforts at developing electric vehicles. All this can be seen, in retrospect, as a clarion electric vehicles--is notable and challenging at the same time. The benefit of pure EV technology

  7. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  8. Decreasing Utility Contract Interest through Annual Payments...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    total interest paid. Annual payments allow Federal agencies to pay for an entire fiscal year (12 months) of payments in advance. This method is attractive to finance companies...

  9. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  10. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Langerhans, Brian

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL; determining rate of spread and social network for smallpox epidemic in Abakaliki, Nigeria (1972) · Studying

  11. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  12. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Siefert, Chris

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL objects. ­ Application provides simple functions to answer queries. ­ Small extra costs in memory_Set_Fn) COMPUTE Move data (Zoltan_Migrate) Clean up (Zoltan_Destroy) APPLICATION Zoltan_LB_Partition: · Call query

  13. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Sidiropoulos, Nikolaos D.

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL of Western Ontario TRICAP June 5, 2006 Improvements to 3-way DEDICOM for Applications in Social Network applications - Study asymmetries in telephone calls among cities - Marketing research · car "switching" - car

  14. Patent Litigation for High Technology and Life Sciences Companies

    E-Print Network [OSTI]

    Shamos, Michael I.

    Patent Litigation for High Technology and Life Sciences Companies #12;© 2005 Fenwick & West LLP Corporate (emerging growth, financings, securities, mergers & acquisitions) n Intellectual Property (patent, copyright, licensing, trademark) n Litigation (patent and other IP, securities, antitrust, employment

  15. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery for Homeland Security Information Management and Knowledge Discovery Authors Tamara Kolda, Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  16. Research in the Interest of National Security

    E-Print Network [OSTI]

    and LANL Graduate Student and PostDoc Training Opportunities Emphasizes nuclear research and policy, non-proliferation apps): $7.5M Engineering, Computer & Computational Sci (100): $7.2M Physics, Nuclear, Astronomy, Computer & Computational Sci - 10 Proposals funded Physics, Nuclear, Astronomy & Astrophys - 9 Proposals

  17. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  18. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  19. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  20. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.

    E-Print Network [OSTI]

    Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department Laboratories Albuquerque, NM 87185 Fusion Power Associates Annual Meeting and Symposium Washington, DC

  1. Chapter 211 Internet Security

    E-Print Network [OSTI]

    Thornton, Mitchell

    management, cost control, and research conflict with patients' interests in privacy. Banks encourage is growing rapidly; for example, the most recent British Crime Survey shows that more than twice as many records systems are bought by hospital directors and insurance companies, whose interests in account

  2. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  3. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  4. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  5. Headquarters Facilities Master Security Plan - Chapter 1, Physical...

    Office of Environmental Management (EM)

    of U.S security interests. These procedures include control of employee and visitor access to HQ buildings, detection and control of dangerous devices, issuance of security...

  6. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.

    E-Print Network [OSTI]

    Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company85000. Status of Z-Pinch ICF ResearchStatus of Z-Pinch ICF Research Fusion Power Associates Meeting

  7. Departmental Personnel Security FAQs | Department of Energy

    Office of Environmental Management (EM)

    under DOE regulations. Q: I currently work for a company where I am required to have a Top Secret security clearance. If I apply for a job that requires a DOE access...

  8. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  9. National Nuclear Security Administration Supplemental Listing...

    National Nuclear Security Administration (NNSA)

    Packaging and Transfer of Materials of National Security Interest DOE O 5480.30 Chg 1 Nuclear Reactor Safety Design Criteria Concurrence Prior to Revision or Cancellation Page...

  10. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  11. Web points of interest

    E-Print Network [OSTI]

    Web points of interest ... JUGGLING CLUB; The Lafayette Citizens Band Home Page; Harold Boas' incredible list of math and life resources on the WEB.

  12. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

    E-Print Network [OSTI]

    Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company85000. Progress on Z-Pinch Inertial Fusion Energy Craig L. Olson Sandia National Laboratories Albuquerque, NM 87185 USA 20th IAEA Fusion Energy Conference Vilamoura, Portugal 1-6 November 2004 RTL DH

  13. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

    E-Print Network [OSTI]

    Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company Corporation, Albuquerque, NM, USA 15) EG&G, Albuquerque, NM, USA 16) Omicron, Albuquerque, NM, USA 17) Fusion #12;Z-Pinch is the newest of the three major drivers for IFE 1999 Snowmass Fusion Summer Study, IAEA

  14. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.

    E-Print Network [OSTI]

    Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company85000. Z-Pinch Inertial Fusion Energy Craig L. Olson + Z-IFE Team Sandia National Laboratories Albuquerque, NM 87185 Fusion Power Associates Annual Meeting and Symposium Washington, DC October 11-12, 2005

  15. Exceptional service in the national interest www.sandia.gov

    E-Print Network [OSTI]

    Siefert, Chris

    Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE, which operates Sandia for the U.S. Department of Energy's National Nuclear Security AdministrationExceptional service in the national interest www.sandia.gov Sandia National Laboratories is a multi

  16. Business model transformation for the international division of a fortune 100 high technology company

    E-Print Network [OSTI]

    Mokhtari Dizaji, Reza, 1968-

    2008-01-01

    Raytheon Canada in Waterloo, Ontario offers a very interesting but challenging research case. As one of the international divisions of Raytheon Corporation, the company has a business model similar to its parent company. ...

  17. Transcription Pharmaceutical Company

    E-Print Network [OSTI]

    Oliva, Aude

    Transcription Pharmacy CDC Pharmaceutical Company Pharmacy Benefits Manager Analytics ICU thedatamap.org #12;Transcription Pharmacy CDC Pharmaceutical Company Pharmacy Benefits Manager Analytics Management Researcher Consulting Physician Health IT Other Government Federal Trade Commission You

  18. Constructivist Approach To Information Security Awareness In The Middle East

    E-Print Network [OSTI]

    Wang, Yongge

    Constructivist Approach To Information Security Awareness In The Middle East Mohammed Boujettif the application of an approach to en- hance information security awareness amongst employees within middle- eastern companies, in effort to improve information security. We aim at surveying the current attitudes

  19. Market Research Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    development - Market research for enterprise and education adoption - Plan and execute a company-wide pingMarket Research Company Description: A company focused on developing web-based graphical and future products and then develop the necessary strategies and collateral to stay on the bleeding edge

  20. Accounting Projects Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    and international tax work for individuals, closely held companies, family offices and clients expecting a liquidityAccounting Projects Company Description: CPA firm performing accounting services, bookkeeping. Company Description: a full service CPA firm headquartered in the San Francisco Bay Area. Nationally

  1. Compound Interest - Purdue

    E-Print Network [OSTI]

    2015-09-03

    In interest theory, the difference between borrowing money and saving money is only in the point of view. ...... How long will it take you to save. $38,000 for your ...

  2. Quantifying and managing the risk of information security breaches participants in a supply chain

    E-Print Network [OSTI]

    Bellefeuille, Cynthia Lynn

    2005-01-01

    Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

  3. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  4. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  5. QER- Comment of Southern Company

    Broader source: Energy.gov [DOE]

    Southern Company Services, Inc., as agent for Alabama Power Company, Georgia Power Company, Gulf Power Company, and Mississippi Power Company, (collectively, “Southern Companies”), are pleased to hereby provide their comments to the Department of Energy as it prepares the Quadrennial Energy Review. If there is anything else that we can do in this regard, please feel free to contact us.

  6. Faculty of MANAGEMENT Alberta Oil & Gas Company1

    E-Print Network [OSTI]

    Nakayama, Marvin K.

    Faculty of MANAGEMENT Alberta Oil & Gas Company1 Daphne Jackson, operations manager for Alberta Oil & Gas Company (AOGC) hangs up the phone in her home. Her boss, Will Russell, has phoned from Calgary's interest in the Waptaman oil field. Ordinarily, Will would lead such negotiations himself, but he has been

  7. RESEARCH STATEMENT Research Interest

    E-Print Network [OSTI]

    Khan, Taufiquar R.

    networks such as the "smart grid," sparse signal representation, and robust signal detection in power the power system network relevant to the "smart grid." I am interested in building a large externally funded the inverse parameter estimation problem requires minimizing an error or a cost functional J(q;z,f). In most

  8. An Interesting Identity

    E-Print Network [OSTI]

    Brett Pansano

    2015-03-13

    This purpose of this paper is to note an interesting identity derived from an integral in Gradshteyn and Ryzhik using techniques from George Boros'(deceased) Ph.D thesis. The idenity equates a sum to a product by evaluating an integral in two different ways. A more general form of the idenity is left for further investigation.

  9. Facility Approvals, Security Surveys, and Nuclear Materials Surveys

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03

    To establish the Department of Energy (DOE) requirements for granting facility approvals prior to permitting safeguards and security interests on the premises and the conduct of on-site security and/or nuclear material surveys of facilities with safeguards and security interests. Cancels DOE O 5630.7 and DOE O 5634.1. Canceled by DOE 5634.1B.

  10. Facility Approvals, Security Surveys, and Nuclear Materials Surveys

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-09-15

    To establish Department of Energy (DOE) requirements for granting facility approvals prior to permitting safeguards and security interests on the premises and the conduct of insite security and/or nuclear material surveys of facilities with safeguards and security interests. Cancels DOE 5634.1A. Canceled by DOE O 470.1 dated 9-28-95.

  11. Capital Reporting Company Quadrennial ...

    Broader source: Energy.gov (indexed) [DOE]

    3 05-27-2014 (866) 448 - DEPO www.CapitalReportingCompany.com 2014 1 QUADRENNIAL ENERGY REVIEW STAKEHOLDER MEETING 3 PETROLEUM TRANSMISSION, STORAGE AND DISTRIBUTION ISSUES...

  12. Capital Reporting Company Quadrennial ...

    Broader source: Energy.gov (indexed) [DOE]

    - DEPO www.CapitalReportingCompany.com 2014 1 UNITED STATE OF AMERICA DEPARTMENT OF ENERGY ---: : IN RE: : : QUADRENNIAL ENERGY REVIEW : : NEW...

  13. DESIGN FOR PROCESS SECURITY Korkut Uygun and Yinlun Huang*

    E-Print Network [OSTI]

    Huang, Yinlun

    , cyber security, and process security. While the first two can be assured through improving plantDESIGN FOR PROCESS SECURITY Korkut Uygun and Yinlun Huang* Department of Chemical Engineering Lamar University, Beaumont, TX 77706 Abstract Chemical process security has been an area of interest due

  14. A Proof of Security of a Mesh Security Architecture *Doug Kuhlman,

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Proof of Security of a Mesh Security Architecture *Doug Kuhlman, Ryan Moriarty, Tony Braskich a Mesh Security Architecture (MSA), with an interesting key hierarchy and full pro- tocol definitions a substantial efficiency improvement in certain instances. To prove the entire architecture se- cure, we utilize

  15. Marketing Plan Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    Marketing Plan Company Description: Consumer company that provides a product to helps boost Marketing Swat Team Project Description and Deliverables: The team will Identify the best online vehicles of promotions from YouTube celebs, co- marketing with related businesses, affiliate marketing, cross marketing

  16. Entrepreneurship Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    with an industry leader). The team will also help to identify key management team members that may be brought on for venture capital funding presentation, key management team member recommendations. Company Description and headquartered in Utah. Our company conducts pharmaceutical trials in the neurosciences, particularly

  17. Garden Variety Coffee Company

    E-Print Network [OSTI]

    Wismath, Stephen

    Garden Variety Coffee Company Hiroba Nippon Got Fries? Icy's Subway Pitas, Wraps, Fruit Smoothies legend. The Attic Grill Boston Pizza Brewsters Brewing Company The Cheesecake Café Coco Pazzo Italian Café Dionysios Earl's New to downtown Lethbridge. Fine dining menu. 2 Floor 411-3rd. Ave. South Family

  18. Onsite Packaging and Transfer of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-11-01

    The order prescribes requirements and responsibilities for identifying and mitigating undue risk of onsite transfers that are non compliant with U.S. Department of Transportation and Nuclear Regulatory Commission regulations. Supersedes DOE O 461.1A and DOE M 461.1-1, Admin Chg 1.

  19. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in the DOE SunShot Initiative. SunShot is a collaborative national initiative to make solar energy cost competitive with other energy generation by 2020. Reducing the installed...

  20. Packaging and Transfer of Materials of National Security Interest Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-29

    The purpose of this Technical Manual is to establish requirements for operational safety controls for onsite operations. This Technical Manual provides Department of Energy (DOE) technical safety requirements and policy objectives for development of an onsite packaging and transfer program, pursuant to DOE O 461.1; the DOE contractor must document this program in its onsite packaging and transfer manual/procedures. Does not cancel other directives.

  1. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    human reliability assessments (HRAs) are important elements of any comprehensive risk analysis. Sandia applies HRAs to these systems in order to generate statistical...

  2. Manual for Protection and Control of Safeguards and Security Interests

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-04-10

    This Manual provides detailed requirements to supplement DOE O 5632.1C, which establishes policy for the protection and control of special nuclear material, Vital Equipment, classified matter, Departmental property and facilities, and unclassifed irradiated reactor fuel in transit. Chapter XI canceled by DOE O 470.1. Chapter III, paragraphs 1, 2, and 4 through 9 canceled by DOE O 471.2. DOE M 473.1-1 cancels the rest of this directive.

  3. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in Complex Systems Important

  4. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in Complex Systems Important3432P

  5. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in Complex Systems

  6. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in Complex SystemsWorking Together

  7. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in Complex SystemsWorking

  8. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in Complex SystemsWorking8138P

  9. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in Complex

  10. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexP Gathering Vital

  11. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexP Gathering VitalTo meet

  12. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexP Gathering VitalTo

  13. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexP Gathering VitalToA New

  14. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexP Gathering VitalToA

  15. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexP Gathering

  16. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexP Gathering1846P

  17. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexP Gathering1846P0987P

  18. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexP

  19. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexPThermal Phenomena in

  20. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexPThermal Phenomena

  1. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR0987P Uncertainty in ComplexPThermal Phenomena0987P

  2. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence

  3. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P Energy Storage System Safety

  4. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P Energy Storage System

  5. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P Energy Storage System741P

  6. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P Energy Storage

  7. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P Energy Storage552P Managing

  8. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P Energy Storage552P

  9. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P Energy Storage552P787P

  10. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P Energy Storage552P787PThe

  11. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P Energy

  12. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P EnergyLithium-ion (Li-ion)

  13. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P EnergyLithium-ion

  14. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P EnergyLithium-ionSandia is a

  15. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P EnergyLithium-ionSandia is

  16. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P EnergyLithium-ionSandia

  17. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P EnergyLithium-ionSandiaTo

  18. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502P EnergyLithium-ionSandiaToThe

  19. President Harry S. Truman Fellowship National Security Science and Engineering

    E-Print Network [OSTI]

    Siefert, Chris

    President Harry S. Truman Fellowship in National Security Science and Engineering May 2013 TABLE interest. The President Harry S. Truman Fellowship in National Security Science and Engineering (Truman...........................................................................................2 2.0 SANDIA NATIONAL LABORATORIES MISSION

  20. President Harry S. Truman Fellowship National Security Science and Engineering

    E-Print Network [OSTI]

    Siefert, Chris

    President Harry S. Truman Fellowship in National Security Science and Engineering May 2015 TABLE interest. The President Harry S. Truman Fellowship in National Security Science and Engineering (Truman...........................................................................................2 2.0 SANDIA NATIONAL LABORATORIES MISSION

  1. Upgraded Coal Interest Group

    SciTech Connect (OSTI)

    Evan Hughes

    2009-01-08

    The Upgraded Coal Interest Group (UCIG) is an EPRI 'users group' that focuses on clean, low-cost options for coal-based power generation. The UCIG covers topics that involve (1) pre-combustion processes, (2) co-firing systems and fuels, and (3) reburn using coal-derived or biomass-derived fuels. The UCIG mission is to preserve and expand the economic use of coal for energy. By reducing the fuel costs and environmental impacts of coal-fired power generation, existing units become more cost effective and thus new units utilizing advanced combustion technologies are more likely to be coal-fired.

  2. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  3. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  4. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  5. Provably Secure Obfuscation of Diverse Watermarks for Sequential Circuits

    E-Print Network [OSTI]

    cryptographic results of provable obfuscation of this function family to build a secure sequential multi, or memory, and the company's revenue is based on the IP value. A major issue in this business model house A collects the royalty to allow company B the rights of using its intellectual property (denoted

  6. Spin-out Company PortfolioTechnology Transfer The Sir Colin Campbell Building

    E-Print Network [OSTI]

    Aickelin, Uwe

    -out companies is just one of a number of mechanisms by which universities drive forward the commercialisationSpin-out Company PortfolioTechnology Transfer The Sir Colin Campbell Building The University is to be recognised around the world for our signature contributions, especially in global food security, energy

  7. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  8. Security Technology Demonstration and Validation Sustainability Plan

    SciTech Connect (OSTI)

    2008-08-31

    This report describes the process of creating continuity and sustainability for demonstration and validation (DEMVAL) assets at the National Security Technology Incubator (NSTI). The DEMVAL asset program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The mission of the NSTI program is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. Part of this support is envisioned to be research and development of companies’ technology initiatives, at the same time providing robust test and evaluation of actual development activities. This program assists companies in developing technologies under the NSTI program through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. Development of the commercial potential for national security technologies is a significant NSTI focus. As part of the process of commercialization, a comprehensive DEMVAL program has been recognized as an essential part of the overall incubator mission. A number of resources have been integrated into the NSTI program to support such a DEMVAL program.

  9. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  10. MACHINE AND FOUNDRY COMPANY

    Office of Legacy Management (LM)

    MACHINE AND FOUNDRY COMPANY kt '- : :' ENGINEERING DIVISIOJ ---. Cl FIELD iRIP ,REP@?T ,' i;:z;zy MEETING REPORT : .I.-.-' Y ::,:I :. &, .I7 ENGINEERING REPORT- : T, ...

  11. Capital Reporting Company Quadrenntial ...

    Broader source: Energy.gov (indexed) [DOE]

    Quadrenntial Energy Review 04-21-2014 (866) 448 - DEPO www.CapitalReportingCompany.com 2014 1 NEW ENGLAND REGIONAL INFRASTRUCTURE CONSTRAINTS A Public Meeting on the Quadrennial...

  12. Capital Reporting Company Quadrennial ...

    Broader source: Energy.gov (indexed) [DOE]

    07-21-2014 (866) 448 - DEPO www.CapitalReportingCompany.com 2014 1 QUADRENNIAL ENERGY REVIEW PUBLIC MEETING 6 MONDAY, JULY 21, 2014 HELD AT: RASHID AUDITORIUM-HILLMAN CENTER...

  13. Capital Reporting Company Quadrennial ...

    Broader source: Energy.gov (indexed) [DOE]

    11-2014 (866) 448 - DEPO www.CapitalReportingCompany.com 2014 1 QUADRENNIAL ENERGY REVIEW PUBLIC MEETING 10: Infrastructure Constraints Monday, August 11, 2014 New Mexico State...

  14. The virtual oil company

    SciTech Connect (OSTI)

    Garibaldi, C.A.; Haney, R.M.; Ross, C.E. [Arthur D Little, Houston, TX (United States)

    1995-09-01

    In anticipation of continuing declines in upstream activity levels over the next 15 years, the virtual oil company model articulates a vision of fewer, leaner, but financially stronger firms that concentrate only on their core competencies and outsource the rest through well-structured partnering arrangements. Freed from the ``clutter,`` these leading companies will be in better position to focus on those opportunities that offer the potential for renewed reserve and revenue growth.

  15. NNSA Seeking Comments on Consolidated IT and Cyber Security Support...

    Broader source: Energy.gov (indexed) [DOE]

    seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding...

  16. Case study on accounting fraud of U.S.-listed Chinese companies

    E-Print Network [OSTI]

    An, Tingting

    2014-01-01

    During the period from 2009 to 2013, 76 out of 848 U.S. federal securities class action litigations were against Chinese companies listed in U.S. markets. The U.S. Securities and Exchange Commission (SEC) has also initiated ...

  17. Company and Industry Research guide

    E-Print Network [OSTI]

    Azevedo, Ricardo

    are going away, company buyouts, changing technology, along with other factors. In an age of downsizing

  18. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  19. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  20. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  1. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  2. Evolving Secure Computer Infrastructures Computer Science Department

    E-Print Network [OSTI]

    Fulp, Errin W.

    , . . . Security research has been network oriented High-speed firewall company, GreatWall Systems Research is more, quarrying, and oil and gas extraction Petroleum and coal products manufacturing Mining Furniture related to bio-inspiration published in 2012. Of the top 10 universities, 5 were Chinese and 2 were

  3. National Nuclear Security Administration Supplemental Listing...

    National Nuclear Security Administration (NNSA)

    and Transfer of Materials of National Security Interest NA-SH-10 DOE O 5480.30 Chg 1 Nuclear Reactor Safety Design Criteria NA-SH-10 Concurrence Prior to Revision or...

  4. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  5. Exceptional service in the national interest www.sandia.gov

    E-Print Network [OSTI]

    Siefert, Chris

    Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DEExceptional service in the national interest www.sandia.gov Kimberly (Kim) C. Sawyer Sandia National Laboratories P.O. Box 5800, MS-0109 Albuquerque, NM 87185-0109 Phone: (505) 844-8358 Fax: (505

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  7. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  8. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  9. Feasibility Study Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    Feasibility Study Company Description: The ZZZZZ Office works with start-ups and established...realized with more than 15,000 employees. Short Project Name: Migrate small waste treatment system from Latin America houses which are built in areas where there is no sewer drain line. In order to covert black waters

  10. Company No: 3344784 COMPANIES ACTS 1985 TO 1989

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    have power: 1 As amended by Special Resolution passed on 1 December 2005 2 As amended by written company including any trading subsidiary of the Company establishedfor the purposesof raising funds for the objects of the Company PROVIDED THAT the activities of any such trading subsidiary should

  11. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  12. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  13. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  14. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  15. Stock Analysis with Correlation for Gasoline Companies

    E-Print Network [OSTI]

    Sun, Yi Xin

    2015-01-01

    with Correlation for Gasoline Companies A thesis submittedwith Correlation for Gasoline Companies by Yi Xin Sun Masterstudied to major gasoline companies based in United States.

  16. No Company Is An Island 

    E-Print Network [OSTI]

    Maddox, A.

    1989-01-01

    No company is an island. Utilities and their industrial customers are discovering that collaboration can breed opportunity while isolation can lead to ruin. Inter company relationships have changed over recent years and HL&P and its customers...

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  20. Information Systems Projects Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    from database. Company Description: We have been in business since January, 1970. Family ownedInformation Systems Projects Company Description: We are a successful small business that provides/fixes to our MS Access program. This will allow us to use the program more smoothly, etc. Company Description

  1. Interested Parties - MEMA | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    MEMA Interested Parties - MEMA 08-14-10MEMA.pdf More Documents & Publications Interested Parties - Chrystler Interested Parties - Smith Dawson & Andrews Interested Parties - NYU...

  2. Interests

    E-Print Network [OSTI]

    $author.value

    Resources ... Their "eigenfunctions", called resonant states, however are required to be outgoing, instead of having finite energy. Resonances are complex ...

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  4. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  5. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  6. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  7. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  8. Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000 Microfabricated Surface Electrode Ion Tr

    E-Print Network [OSTI]

    Hensinger, Winfried

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL

  9. Oil and Gas Company Oil and Gas Company Address Place Zip Website

    Open Energy Info (EERE)

    Company Oil and Gas Company Address Place Zip Website Abu Dhabi National Oil Company Abu Dhabi National Oil Company Abu http www adnoc ae default aspx Al Furat Petroleum Company Al...

  10. An Overview of the Security Concerns in Enterprise Cloud Computing

    E-Print Network [OSTI]

    Bisong, Anthony; Rahman, M; 10.5121/ijnsa.2011.3103

    2011-01-01

    Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. We believe enterprise should analyze the company/organization security risks, threats, and available countermeasures before adopting this technology. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. We have also explained cloud computing strengths/benefits, weaknesses, and applicable areas in information risk management.

  11. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  12. New companies get boost from Los Alamos National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesofPublications64 2.251 2.211New SpeciesNewNationalNew AlgalandNew

  13. PIA - Access Security Plan, Bechtel Jacobs Company LLC | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014DepartmentCouncilOfficeBudgetOverviewGDP

  14. Cloud Computing Security in Business Information Systems

    E-Print Network [OSTI]

    Ristov, Sasko; Kostoska, Magdalena

    2012-01-01

    Cloud computing providers' and customers' services are not only exposed to existing security risks, but, due to multi-tenancy, outsourcing the application and data, and virtualization, they are exposed to the emergent, as well. Therefore, both the cloud providers and customers must establish information security system and trustworthiness each other, as well as end users. In this paper we analyze main international and industrial standards targeting information security and their conformity with cloud computing security challenges. We evaluate that almost all main cloud service providers (CSPs) are ISO 27001:2005 certified, at minimum. As a result, we propose an extension to the ISO 27001:2005 standard with new control objective about virtualization, to retain generic, regardless of company's type, size and nature, that is, to be applicable for cloud systems, as well, where virtualization is its baseline. We also define a quantitative metric and evaluate the importance factor of ISO 27001:2005 control objecti...

  15. Gas supplies of interstate/natural gas pipeline companies 1989

    SciTech Connect (OSTI)

    Not Available

    1990-12-18

    This publication provides information on the interstate pipeline companies' supply of natural gas during calendar year 1989, for use by the FERC for regulatory purposes. It also provides information to other Government agencies, the natural gas industry, as well as policy makers, analysts, and consumers interested in current levels of interstate supplies of natural gas and trends over recent years. 5 figs., 18 tabs.

  16. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  18. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  19. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  20. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  1. Outfits - Company E - 17 

    E-Print Network [OSTI]

    Unknown

    2006-01-01

    -in and value Rentals 10% less than 30 days; Rentals: Rental rate 6.25% more than 30; interstate carriers 6.25% Corporate Franchises $2.50 Per $1,000 of taxable capital or or earned surplus, whichever 4.5% is greater. Motor Fuels 20? Gasoline: per gallon Fuel... content Malt Liquor 19.8? Per gallon Mixed Drinks 14% Receipt value (price) Passenger Drinks 5? Per serving Insurance Companies: Life, Accident & Health 1.75% Texas investments Property & Casualty 1.6 - 3.5% Texas investments Title 1.3 - 2.0% Texas...

  2. Company Level Imports Archives

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979Coal4Cubic Feet)Cubic1992 Consumption andRobertCompany

  3. Regional companies eye growth

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAbout UsRegional companies eye growth Regional

  4. Company Level Imports

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry Natural Gas ReservesAlabamaAboutTotalWhy I Chose EIA#N/A 2010Company

  5. Feigning interest in relationship initiation 

    E-Print Network [OSTI]

    Leck, Kira Marie

    1996-01-01

    This study examined the behaviors that people engage in when they attempt to feign romantic interest and noninterest in a potential dating partner. Participants were videotaped as they answered questions posed by an opposite-sex "interviewer...

  6. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    operates a number of power stations including the largest coal fired power station in the world as well as the Koeberg nuclear power station Esmeralda Energy Company Esmeralda...

  7. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  8. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  9. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  10. Arbitrage With Fixed Costs" and Interest Rate Models Elys JOUINI Clotilde NAPPy

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Arbitrage With Fixed Costs" and Interest Rate Models Elyčs JOUINI Clotilde NAPPy June 26, 2007 Congress participants and in particular D. Feldman. 1 #12;Arbitrage With "Fixed Costs" and Interest Rate Models Abstract In this paper, we study securities market models with "...xed costs." We characterize

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  13. Interested Parties - Chrystler | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parties - Chrystler 06-22-10Chrystler.pdf More Documents & Publications Interested Parties - Smith Dawson & Andrews Interested Parties - Myriant Interested Parties - Dow Chemical...

  14. SECURE MODIFICATION TO A FILE PROTECTION SYSTEM THAT USES A FINGERPRINT IDENTIFICATION TECHNIQUE

    E-Print Network [OSTI]

    , kindness, and friendship. Also, I would like to give special thanks to my family, especially my mother, executive members, and/or scientists of a company. The main purpose is to help a company maintain problems. People are afraid that someone could steal their data or hack into their systems. Data security

  15. Interests Diffusion in Social Networks

    E-Print Network [OSTI]

    D'Agostino, Gregorio; De Nicola, Antonio; Tucci, Salvatore

    2015-01-01

    Understanding cultural phenomena on Social Networks (SNs) and exploiting the implicit knowledge about their members is attracting the interest of different research communities both from the academic and the business side. The community of complexity science is devoting significant efforts to define laws, models, and theories, which, based on acquired knowledge, are able to predict future observations (e.g. success of a product). In the mean time, the semantic web community aims at engineering a new generation of advanced services by defining constructs, models and methods, adding a semantic layer to SNs. In this context, a leapfrog is expected to come from a hybrid approach merging the disciplines above. Along this line, this work focuses on the propagation of individual interests in social networks. The proposed framework consists of the following main components: a method to gather information about the members of the social networks; methods to perform some semantic analysis of the Domain of Interest; a p...

  16. Industry Analysis and Customer Segmentation Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    : A leading health care company, serving more than 75 million people worldwide. Our family of companiesIndustry Analysis and Customer Segmentation Company Description: Our company specializes will research geographic market share by brand/company. The final deliverable will be a prioritized list

  17. Real Estate Development Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    Real Estate Development Company Description: The largest specialty family footwear retailer America, the Caribbean and South America. Short Project Name: Competitive Analysis - Real Estate Positions to assist them in making recommendations for how our company should develop its real estate strategy

  18. Capital Markets Finance Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    quantitative and qualitative evidence to support your recommendation The first half of the semester. The team will perform a company-by-company analysis of industry participants (qualitative and quantitative-15 slide powerpoint presentation that highlights industry dynamics and a clear and unique investment thesis

  19. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  20. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  1. (No) Security in Automation!?

    E-Print Network [OSTI]

    Lüders, S

    2008-01-01

    Modern Information Technologies like Ethernet, TCP/IP, web server or FTP are nowadays increas-ingly used in distributed control and automation systems. Thus, information from the factory floor is now directly available at the management level (From Shop-Floor to Top-Floor) and can be ma-nipulated from there. Despite the benefits coming with this (r)evolution, new vulnerabilities are in-herited, too: worms and viruses spread within seconds via Ethernet and attackers are becoming interested in control systems. Unfortunately, control systems lack the standard security features that usual office PCs have. This contribution will elaborate on these problems, discuss the vulnerabilities of modern control systems and present international initiatives for mitigation.

  2. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  3. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  4. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  5. U.S. Seeks to Boost Security, Soothe Public By Eric Pianin and Ellen Nakashima

    E-Print Network [OSTI]

    Ho, Cliff

    companies, urging them to take greater security precautions, from locking doors to reviewing emergency response plans to rechecking the backgrounds of employees and contractors. The Energy Department said, in a coordinated and effective manner." Meanwhile, a number of states instituted their own security measures

  6. Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage

    E-Print Network [OSTI]

    Minnesota, University of

    Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage Vishal Kher Yongdae Kim are witnessing a revival of Storage Service Providers (SSP) in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are hesitating to outsource

  7. Regional Drinking Water Security Action research, policy and analysis

    E-Print Network [OSTI]

    Sohoni, Milind

    electricity, household energy use, small-town planning, post-harvest agriculture, water policy analysisRegional Drinking Water Security Action research, policy and analysis Milind Sohoni Centre, research Companies in development sector, think-tanks and NGOs Current Research Drinking water, grid

  8. W I N T E R 2 0 1 4 MAGNETIC MONTREAL > SPARKING YOUTH INTEREST > CANADIAN BUSINESS STRENGTH

    E-Print Network [OSTI]

    Doedel, Eusebius

    home and auto insurance program is underwritten by SECURITY NATIONAL INSURANCE COMPANY. The program, in Canada and/or other countries. HOME | AUTO | TRAVEL Insurance program recommended by You could WIN $60, as a Concordia University graduate or student, you have access to our TD Insurance Meloche Monnex program which

  9. they have attracted interest from industry. Indeed, one company, SupraPolix, produces

    E-Print Network [OSTI]

    Keeling, Patrick

    supramolecular polymers with the ability to self-heal, although temperatures of 140 °C must be used. Now, however and easily recycled -- so it is environmentally friendly, too. Justin L. Mynar and Takuzo Aida

  10. 12 December 2014 SENT TO LSU AGCENTER/LOUISIANA FOREST PRODUCTS DEVELOPMENT CENTER -FOREST SECTOR / FORESTY PRODUCTS INTEREST GROUP

    E-Print Network [OSTI]

    . "In addition to furniture manufacturing, the larger forest products employment base includes / FORESTY PRODUCTS INTEREST GROUP Wisconsin tops the nation in wood furniture manufacturing employment and skilled workforce helped the state secure the top ranking nationwide in wood furniture manufacturing

  11. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  12. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  13. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  14. Deere & Company Energy Management Program 

    E-Print Network [OSTI]

    Darby, D. F.

    1981-01-01

    An overview of the Deere & Company Energy Management Program is discussed. A review is made of seven key elements which have contributed to the success of the program. Installed projects and established programs are identified and discussed...

  15. How companies can leverage crowdsourcing

    E-Print Network [OSTI]

    Cheung, Sunny

    2012-01-01

    Crowdsourcing is an increasingly popular phenomenon where companies solicit the help of the public in helping accomplish some of the activities commonly performed by employees or contractors. These activities can range ...

  16. The valuation of construction companies

    E-Print Network [OSTI]

    Sassine, Edmond, 1980-

    2004-01-01

    The main objective of this thesis is to study the valuation of construction companies in mergers and acquisitions. The thesis is divided into three main parts; Mergers and Acquisitions, Valuation, and a Case Study. Mergers ...

  17. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  18. Eastern Kodak Company

    SciTech Connect (OSTI)

    Y.S. Tyan

    2009-06-30

    Lighting consumes more than 20% of electricity generated in the United States. Solid state lighting relies upon either inorganic or organic light-emitting diodes (OLEDs). OLED devices because of their thinness, fast response, excellent color, and efficiency could become the technology of choice for future lighting applications, provided progress is made to increase power efficiency and device lifetime and to develop cost-effective manufacturing processes. As a first step in this process, Eastman Kodak Company has demonstrated an OLED device architecture having an efficacy over 50 lm/W that exceeds the specifications of DOE Energy Star Program Requirements for Solid State Lighting. The project included work designed to optimize an OLED device, based on a stacked-OLED structure, with performance parameters of: low voltage; improved light extraction efficiency; improved internal quantum efficiency; and acceptable lifetime. The stated goal for the end of the project was delivery of an OLED device architecture, suitable for development into successful commercial products, having over 50 lum/W power efficiency and 10,000 hours lifetime at 1000 cd/m{sup 2}. During the project, Kodak developed and tested a tandem hybrid IES device made with a fluorescent blue emitter, a phosphorescent yellow emitter, and a phosphorescent red emitter in a stacked structure. The challenge was to find low voltage materials that do not absorb excessive amounts of emitted light when the extraction enhancement structure is applied. Because an extraction enhancement structure forces the emitted light to travel several times through the OLED layers before it is emitted, it exacerbates the absorption loss. A variety of ETL and HTL materials was investigated for application in the low voltage SSL device structure. Several of the materials were found to successfully yield low operating device voltages without incurring excessive absorption loss when the extraction enhancement structure was applied. An internal extraction layer comprises two essential components: a light extraction element (LEE) that does the actual extraction of emitted light and a light coupling layer (LCL) that allows the emitted light to interact with the extraction element. Modeling results show that the optical index of the LCL needs to be high, preferably higher than that of the organic layers with an n value of {approx}1.8. In addition, since the OLED structure needs to be built on top of it the LCL needs to be physically and chemically benign. As the project concluded, our focus was on the tandem hybrid device, which proved to be the more efficient architecture. Cost-efficient device fabrication will provide the next challenges with this device architecture in order to allow this architecture to be commercialized.

  19. Seawalls Are Not Enough: Climate Change & U.S. Interests

    E-Print Network [OSTI]

    Freeman, Jody; Guzman, Andrew

    2009-01-01

    National SecurityImpacts on U.S. National Security (Ctr. for Int’l EarthClimate Change and National Security: An Agenda for Action,

  20. Interested but unsure: Public attitudes toward electric vehicles in China

    E-Print Network [OSTI]

    Lo, Kevin

    2013-01-01

    emissions, enhanced energy security and low running costs.low running costs and energy security on the positives, andair pollution Enhance energy security Long charge time

  1. Movement for repeal of the Public Utility Holding Company Act

    SciTech Connect (OSTI)

    Brown, C.; Bink, B.

    1982-05-13

    A regulatory pyramid that may have replaced the financial pyramids which the Public Utility Holding Company Act (PUHCA) of 1935 sought to tear down is a burden the Reagan administration feels is easily removed. Reagan's federalism policy, however, will place even more control in the hands of the state-level regulators who are causing most of the problems for utilities. DOE and the Securities and Exchange Commission favor repeal of PUHCA, while the Justice Department and the National Association of Regulatory Utility Commissioners are opposed. Congressional hearings are now taking testimony on the pros and cons of repeal. (DCK)

  2. 2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks on a smart grid. Keywords: smart grid cyber security; cyber attack impact analysis; graph-based dynamical systems; smart and Computer Engineering at Texas A&M University. Her research interests include cyber security of the smart

  3. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  4. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  5. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  6. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  7. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  8. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  9. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  10. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  11. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  12. Natural gas annual 1993 supplement: Company profiles

    SciTech Connect (OSTI)

    Not Available

    1995-02-01

    The Natural Gas Annual provides information on the supply and disposition of natural gas to a wide audience including industry, consumers, Federal and State agencies, and educational institutions. This report, the Natural Gas Annual 1993 Supplement: Company Profiles, presents a detailed profile of 45 selected companies in the natural gas industry. The purpose of this report is to show the movement of natural gas through the various States served by the companies profiled. The companies in this report are interstate pipeline companies or local distribution companies (LDC`s). Interstate pipeline companies acquire gas supplies from company owned production, purchases from producers, and receipts for transportation for account of others. Pipeline systems, service area maps, company supply and disposition data are presented.

  13. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  14. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  15. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  16. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  17. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  18. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  19. Energy Management at Deere & Company 

    E-Print Network [OSTI]

    Boyd, M. P.

    1979-01-01

    Deere & Company appreciates the opportunity to discuss energy management and conservation with you. Energy is a topic that will occupy our thoughts for many years to come and certainly will be in the forefront in the near future. It is a subject...

  20. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    Energie AG MVV Energie AG Mannheim North Rhine Westphalia Germany Biomass Hydro Hydrogen Solar Vehicles Wind energy International energy distribution utility with interests in gas...

  1. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  3. Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical...

    Energy Savers [EERE]

    Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company:...

  4. PP-221 Detroit Edison Company | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PP-221 Detroit.pdf More Documents & Publications PP-228 Edison Sault Electric Company PP-230-4 International Transmission Company PP-76 The Vermont Electric Transmission Company...

  5. Issue 5: High Interest in Hybrid Cars

    E-Print Network [OSTI]

    Ong, Paul M.; Haselhoff, Kim

    2005-01-01

    2005). “High Interest in Hybrid Cars. ” SCS Fact Sheet, Vol.May 2005 High Interest in Hybrid Cars I NTRODUCTION PublicThe unique features of a hybrid car mean that it is more

  6. Energy Efficiency Interest Rate Reduction Program

    Broader source: Energy.gov [DOE]

    For new and existing home purchases that are rated 6 Star or 5 Star Plus, applicants are eligible for an interest rate reduction for the first $200,000 of the loan amount, with a blended interest...

  7. Natural gas annual 1992: Supplement: Company profiles

    SciTech Connect (OSTI)

    Not Available

    1994-01-01

    The data for the Natural Gas Annual 1991 Supplement : Company Profiles are taken from Form EIA-176, (open quotes) Annual Report of Natural and Supplemental Gas Supply and Disposition (close quotes). Other sources include industry literature and corporate annual reports to shareholders. The companies appearing in this report are major interstate natural gas pipeline companies, large distribution companies, or combination companies with both pipeline and distribution operations. The report contains profiles of 45 corporate families. The profiles describe briefly each company, where it operates, and any important issues that the company faces. The purpose of this report is to show the movement of natural gas through the various States served by the 45 large companies profiled.

  8. Premier Access Insurance Company Certificate of Insurance

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    Premier Access Insurance Company Certificate of Insurance Policy/Group Number: 3725 We certify provided by Premier Access Insurance Company for You and Your eligible Dependents. All terms and benefits...................................................... Family Deductible Amount

  9. Other Purdue Web points of Interest

    E-Print Network [OSTI]

    Other Purdue Web points of interest. Purdue University Home Page --- Schedule of Classes · Graduate School · Agronomy · Computer Science --- CS & E ...

  10. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus Jump

  11. Energy Audit Helps Small Company Stay Competitive

    Broader source: Energy.gov [DOE]

    The recommended improvements are saving the West Linn Paper Company in Oregon an annual cost of about $380,000.

  12. UNDERSTANDING OUR COMPANY AN IBM PROSPECTUS

    E-Print Network [OSTI]

    a company or planned venture so that individuals can make informed decisions. Fully understanding the future lay in consolidation, and chose to bulk up. And then some companies just concluded that their core confidence in IBM's future. We have done much in recent years to transform our company. In a number

  13. Illinois Company Implementing Solar Energy

    Office of Energy Efficiency and Renewable Energy (EERE)

    J.F. Family Limited Partnership has been awarded $191,000 through the Recovery Act toward the use of solar energy at its Lakefront Parkway property in Edwardsville, Ill., which is the company headquarters for J.F. Electric Inc. The funding will be used to install a 75-kW solar photovoltaic system on the building’s roof, creating electricity on-site and creating or saving a total of 14 jobs.

  14. Informao Confidencial e Proprietria Confidential and Proprietary Information Company Profile

    E-Print Network [OSTI]

    Informaçăo Confidencial e Proprietária Confidential and Proprietary Information Company Profile Information 2 Summary (I) Company Facts (II) Company Capabilities (III) Projects & Products (IV) On Information (I) Company Facts #12;26-Aug-2010 4 Informaçăo Confidencial e Proprietária Confidential

  15. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  16. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  17. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  18. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  19. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  20. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  1. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  2. The Resilient Economy: Integrating Competitiveness and Security

    SciTech Connect (OSTI)

    Debbie van Opstal

    2009-01-07

    Globalization, technological complexity, interdependence, terrorism, climate and energy volatility, and pandemic potential are increasing the level of risk that societies and organizations now face. Risks also are increasingly interrelated; disruptions in one area can cascade in multiple directions. The ability to manage emerging risks, anticipate the interactions between different types of risk, and bounce back from disruption will be a competitive differentiator for companies and countries alike in the 21st century. What Policymakers Should Know The national objective is not just homeland protection, but economic resilience: the ability to mitigate and recover quickly from disruption. Businesses must root the case for investment in resilience strategies to manage a spectrum of risks, not just catastrophic ones. Making a business case for investment in defenses against low-probability events (even those with high impact) is difficult. However, making a business case for investments that assure business continuity and shareholder value is not a heavy lift. There are an infinite number of disruption scenarios, but only a finite number of outcomes. Leading organizations do not manage specific scenarios, rather they create the agility and flexibility to cope with turbulent situations. The investments and contingency plans these leading companies make to manage a spectrum of risk create a capability to respond to high-impact disasters as well. Government regulations tend to stovepipe different types of risk, which impedes companies abilities to manage risk in an integrated way. Policies to strengthen risk management capabilities would serve both security and competitiveness goals. What CEOs and Boards Should Know Operational risks are growing rapidly and outpacing many companies abilities to manage them. Corporate leadership has historically viewed operational risk management as a back office control function. But managing operational risks increasingly affects real-time financial performance. The 835 companies that announced a supply chain disruption between 1989 and 2000 experienced 33 percent to 40 percent lower stock returns than their industry peers. Twenty-five percent of companies that experienced an IT outage of two to six days went bankrupt immediately. Ninety-three percent of companies that lost their data center for 10 days or more filed for bankruptcy within a year.

  3. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  4. Introduction to Mortgage-Backed Securities c 2008 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 969

    E-Print Network [OSTI]

    Lyuu, Yuh-Dauh

    Introduction to Mortgage-Backed Securities c 2008 Prof. Yuh-Dauh Lyuu, National Taiwan University Taiwan University Page 971 #12;Mortgage-Backed Securities · A mortgage-backed security (MBS) is a bond backed by an undivided interest in a pool of mortgages. · MBSs traditionally enjoy high returns, wide

  5. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  6. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  7. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  8. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  9. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  10. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  11. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  12. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  13. FirstEnergy Service Company Smart Grid Project | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban Transport Jump to: navigation, searchSecuritiesClimateFirstCompany

  14. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  15. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  16. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  17. Company Name Company Name Address Place Zip Product Website Region

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus Jump to:OpenInc CPIde

  18. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus Jump to:OpenInc CPIdeSoltech

  19. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus Jump to:OpenInc

  20. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus Jump to:OpenIncEnergy Ltd A A

  1. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus Jump to:OpenIncEnergy Ltd A

  2. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus Jump to:OpenIncEnergy Ltd

  3. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus Jump to:OpenIncEnergy LtdC

  4. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus Jump to:OpenIncEnergy LtdCvan

  5. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus Jump to:OpenIncEnergy

  6. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus Jump to:OpenIncEnergyCharge

  7. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlus JumpQinghai Dangshun

  8. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  9. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  10. Cyber security analysis testbed : combining real, emulation, and simulation.

    SciTech Connect (OSTI)

    Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

    2010-07-01

    Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

  11. DOE Affirms National Interest Electric Transmission Corridor...

    Broader source: Energy.gov (indexed) [DOE]

    requests for rehearing of the Mid-Atlantic and the Southwest Area National Interest Electric Transmission Corridors (National Corridors) designated by DOE in October 2007 as...

  12. Aligning Utility Interests with Energy Efficiency Objectives...

    Open Energy Info (EERE)

    Aligning Utility Interests with Energy Efficiency Objectives: A Review of Recent Efforts at Decoupling and Performance Incentives Jump to: navigation, search Tool Summary LAUNCH...

  13. 24 September 2014 SENT TO LSU AGCENTER/LOUISIANA FOREST PRODUCTS DEVELOPMENT CENTER -FOREST SECTOR / FORESTY PRODUCTS INTEREST GROUP

    E-Print Network [OSTI]

    with biochar companies to help make the product marketable to the oil and gas industry24 September 2014 SENT TO LSU AGCENTER/LOUISIANA FOREST PRODUCTS DEVELOPMENT CENTER - FOREST SECTOR / FORESTY PRODUCTS INTEREST GROUP 1 (in) Biochar used successfully to treat fracking water Post Date: 19

  14. 24 September 2014 SENT TO LSU AGCENTER/LOUISIANA FOREST PRODUCTS DEVELOPMENT CENTER -FOREST SECTOR / FORESTY PRODUCTS INTEREST GROUP

    E-Print Network [OSTI]

    for profitable, large-scale production have failed. The second-largest U.S. oil company by market value spent24 September 2014 SENT TO LSU AGCENTER/LOUISIANA FOREST PRODUCTS DEVELOPMENT CENTER - FOREST SECTOR / FORESTY PRODUCTS INTEREST GROUP 1 Chevron's Search for Plant-Based Alternative Fuels Flounders Joe Carroll

  15. 24 March 2014 SENT TO LSU AGCENTER/LOUISIANA FOREST PRODUCTS DEVELOPMENT CENTER -FOREST SECTOR / FORESTY PRODUCTS INTEREST GROUP

    E-Print Network [OSTI]

    of sustainability for Drax Biomass International, outlined his company's commitment to biomass power and its interest in sustainability. The UK power producer has experimented with a number of biomass sources. Peberdy reported that Drax was pleased with the performance of its first biomass boiler conversion

  16. 5 February 2014 SENT TO LSU AGCENTER/LOUISIANA FOREST PRODUCTS DEVELOPMENT CENTER -FOREST SECTOR / FORESTY PRODUCTS INTEREST GROUP

    E-Print Network [OSTI]

    / FORESTY PRODUCTS INTEREST GROUP 1 Title: Social network media in the forest products industry: A look Manufacturers Inc. (AHMI) surveyed a group of their members to determine if social media was being used, and exporting. Seven appendixes list resources and agencies that provide assistance to wood products companies

  17. A deeper look at climate change and national security.

    SciTech Connect (OSTI)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  18. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  19. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  20. Company Level Imports Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101Company Level Imports Explanatory Notes

  1. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  2. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  3. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  4. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  5. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  6. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  8. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  9. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  10. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  11. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  12. Notes derived from Stallings book Interesting news

    E-Print Network [OSTI]

    Klappenecker, Andreas

    -to-end ­ Tunnel mode · Involves security gateways #12;IPSEC modes #12;IP tunneling A B Internet C D PayloadDest D be combined · AH transport mode · AH tunneling mode · ESP transport mode · ESP tunneling mode #12;IPSEC requires two SAs back and forth #12;What's an SA? · IPSEC protocol mode: ­ transport, tunnel · AH

  13. LLNL: Science in the National Interest

    ScienceCinema (OSTI)

    George Miller

    2010-09-01

    This is Lawrence Livermore National Laboratory. located in the Livermore Valley about 50 miles east of San Francisco, the Lab is where the nations topmost science, engineering and technology come together. National security, counter-terrorism, medical technologies, energy, climate change our researchers are working to develop solutions to these challenges. For more than 50 years, we have been keeping America strong.

  14. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  15. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  16. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  17. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  18. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  19. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  20. Natural gas: Governments and oil companies in the Third World

    SciTech Connect (OSTI)

    Davidson, A.; Hurst, C.; Mabro, R.

    1988-01-01

    It is asserted that oil companies claim to be generally receptive to gas development proposals; however, the lack of potential markets for gas, problems of foreign exchange convertibility, and lack of a legal framework often hinders their engagement. Governments, on the other hand, need to secure domestic energy supply and, if possible, gain some export earnings or royalties. An extensive discussion on the principles of pricing and fiscal regimes, potential points of disagreement is provided. A course of action is outlined from the managerial point of view to circumvent the most common pitfalls in planning and financing a gas project. Eight very detailed case studies are presented for Argentina, Egypt, Malaysia, Nigeria, Pakistan, Tanzania, Tunisia and Thailand.

  1. Enforcement Letter, Lockheed Martin Idaho Technologies Company...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Company related to a Repetitive Problem with Instrument Operability at the Idaho National Engineering and Environmental Laboratory On August 4, 1998, the U.S. Department of Energy...

  2. POWER PURCHASE AGREEMENT DELMARVA POWER & LIGHT COMPANY

    E-Print Network [OSTI]

    Firestone, Jeremy

    POWER PURCHASE AGREEMENT between DELMARVA POWER & LIGHT COMPANY ("Buyer") and BLUEWATER WIND 3.5 Energy Forecasts, Scheduling and Balancing.......................................... 39 3

  3. Gov. Inslee honors Washington industrial companies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    leaders were joined by executives and staff from industrial companies, utilities and energy efficiency organizations at the ceremony. "It was rewarding to hear Gov. Inslee,...

  4. Inland Power & Light Company - Agricultural Energy Efficiency...

    Broader source: Energy.gov (indexed) [DOE]

    70% or project cost Program Info Sector Name Utility Administrator Inland Power & Light Company Website http:www.inlandpower.comcustomercarec.php?id190 State Washington...

  5. Policy #5201 Research Conflict of Interests 1 OLD DOMINION UNIVERSITY

    E-Print Network [OSTI]

    of the academic discipline. Licensed Start-up Company - A licensed start-up company has the following's immediate family, or in trust for any employee's or student's immediate family. Excluded from this definition are companies that license only technology released by the University to the researcher

  6. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  7. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  8. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  9. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  10. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  11. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  12. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  13. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  14. Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid

    E-Print Network [OSTI]

    Shehab, Mohamed

    periods. The peak value of electricity consumption data is extremely important for electric companiesSecure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid Mohammad usage. The scheduling of the energy consumption is often formulated as a game- theoretic problem, where

  15. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire

    E-Print Network [OSTI]

    Xu, Wenyuan

    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System companies to collect data ­ "iChange" controls the car via an iPhone ­ More in-car wireless sensor networks. Virtually, all new cars sold or manufactured after 2007 in US are equipped with wireless TPMS. Computer

  16. Two worlds, one smart card An integrated solution for physical access and logical security

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers to office buildings and plants, companies these days issue their employees a (smart) card that is bothTwo worlds, one smart card An integrated solution for physical access and logical security using

  17. Two worlds, one smart card # An integrated solution for physical access and logical security

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers#ce buildings and plants, companies these days issue their employees a (smart) card that is both an identityTwo worlds, one smart card # An integrated solution for physical access and logical security using

  18. Martin H. Gutknecht Educational Experience and Interests Educational Experience and Interests

    E-Print Network [OSTI]

    Gutknecht, Martin H.

    Martin H. Gutknecht Educational Experience and Interests Educational Experience and Interests taught by the deceased Prof. Heinz Rutishauser, one of the most outstanding and ingenious numerical and distributing them! Teaching and educational writing in recent years After I became director

  19. Industrial & Systems Engineering Areas of Engineering Interests

    E-Print Network [OSTI]

    Berdichevsky, Victor

    selected in Biomedical, Civil and Environmental, Electrical and Mechanical Engineering are thoseIndustrial & Systems Engineering Areas of Engineering Interests The Department of Industrial and Systems Engineering understands our students may work as Industrial Engineers in other engineering

  20. Interested in Political and Environmental Psychology?

    E-Print Network [OSTI]

    British Columbia, University of

    Interested in Political and Environmental Psychology? The Reactions to be stressful, the REST Lab in the Department of Psychology at UBC continues to do research in three major areas: Political Psychology Ongoing projects are studying

  1. Financial Conflict of Interest Policy A. OVERVIEW

    E-Print Network [OSTI]

    to conducting research in a manner that promotes the integrity of the research and maintains the public trust external commitments or significant financial interests of any person(s) with involvement in the design

  2. Safecomp99, 27-29 Sept 1999, Toulouse, France The Integration of Safety and Security Requirements

    E-Print Network [OSTI]

    Moffett, Jonathan

    , there is growing interest in the degree to which techniques from one domain complement or conflict with those from and provides pointers for the future. 2 Survey of Safety and Security Risk Analysis Techniques 2.1 Introduction

  3. Honda motor company's CVCC engine

    SciTech Connect (OSTI)

    Abernathy, W.J.; Ronan, L.

    1980-07-01

    Honda Motor Company of Japan in a four-year period from 1968 to 1872 designed, tested, and mass-produced a stratified charge engine, the CVCC, which in comparison to conventional engines of similar output at the time was lower in CO, HC and NO/sub x/ emissions and higher in fuel economy. Honda developed the CVCC engine without government assistance or outside help. Honda's success came at a time when steadily increasing fuel costs and the various provisions of the Clean Air Act had forced US automakers to consider possible alternatives to the conventional gasoline engine. While most major engine manufacturers had investigated some form of stratified charge engine, Honda's CVCC was the only one to find successful market application. This case study examines the circumstances surrounding the development of the CVCC engine and its introduction into the Japanese and American markets.

  4. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  5. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  6. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  7. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  10. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  11. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  12. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  13. Company number 5857955 Wellcome Trust Finance plc

    E-Print Network [OSTI]

    Rambaut, Andrew

    Company number 5857955 Wellcome Trust Finance plc Annual Report and Financial Statements Year ended 30 September 2014 #12;Company number 5857955 Wellcome Trust Finance plc Contents Page Strategic number 58579551 Wellcome Trust Finance plc Strategic Report For the year ended 30 September 2014

  14. Company number 5857955 Wellcome Trust Finance plc

    E-Print Network [OSTI]

    Rambaut, Andrew

    Company number 5857955 Wellcome Trust Finance plc Annual Report and Financial Statements Year ended 30 September 2012 #12;Company number 5857955 Wellcome Trust Finance plc Contents Page Directors Trust Finance plc Directors' Report for the year ended 30 September 2012 Report of the Directors

  15. Company number 5857955 Wellcome Trust Finance plc

    E-Print Network [OSTI]

    Rambaut, Andrew

    Company number 5857955 Wellcome Trust Finance plc Annual Report and Financial Statements Year ended 30 September 2013 #12;Company number 5857955 Wellcome Trust Finance plc Contents Page Directors Trust Finance plc Directors' Report For the year ended 30 September 2013 Report of the Directors

  16. Woodrow (Woody) K. Shiflett Chevron Products Company

    E-Print Network [OSTI]

    Krovi, Venkat

    Woodrow (Woody) K. Shiflett Chevron Products Company Moving Innovation into the Marketplace&D program, and deriving value from it, offers all the challenges of managing your family's investment study specific to a catalyst enterprise joint venture company and illustrates the value of using stage

  17. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  18. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  19. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  20. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  1. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  2. Cooperative monitoring of regional security agreements

    SciTech Connect (OSTI)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  3. Tampa Electric Company`s Polk Power Station IGCC project

    SciTech Connect (OSTI)

    Jenkins, S.D.

    1995-12-31

    Tampa Electric Company (TEC) is in the construction phase of its new Polk Power Station Unit No. 1. This unique project incorporates the use of Integrated Gasification Combined Cycle (IGCC) technology for electric power production. The project is being partially funded by the US Department of Energy (DOE), as part of the Clean Coal Technology Program. This will help to demonstrate this state-of-the-art technology, providing utilities with the ability to use a wide range of coals in an efficient, environmentally superior manner. During the summer of 1994, TEC began site development at the new Polk Power Station. Since that time, most of the Site work has been completed, and erection and installation of the power plant equipment is well underway. This is the first time that IGCC technology will be installed at a new unit at a greenfield site. This is a major endeavor for TEC in that Polk Unit No. 1 is a major addition to the existing generating capacity and it involves the demonstration of technology new to utility power generation. As a part of the Cooperative Agreement with the DOE, TEC will also be demonstrating the use of a new Hot Gas Clean-Up System which has a potential for greater IGCC efficiency.

  4. Derivative Securities G63.2791.001, Fall 2007

    E-Print Network [OSTI]

    -based pricing of derivative securities. Topics include: arbitrage; risk-neutral valuation; the log, and other interest-based derivatives; credit risk and credit derivatives. This section versus Steve Allen, one every couple of weeks. Col- laboration on homework is encouraged (homeworks are not exams

  5. Security engineering for embedded systems the SecFutur vision

    E-Print Network [OSTI]

    Security engineering for embedded systems ­ the SecFutur vision [Vision Paper] Sigrid Gürgens in the development of embedded systems. However, strongly interconnected em- bedded systems play vital roles in many for embedded systems is a discipline that currently attracts more interest. This paper presents the vision

  6. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  7. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  8. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  9. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  10. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  11. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  12. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  13. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  14. Post-Acquisition Integration: The Cultural Side of the Ferguson Paper Company, Inc. Acquisition of Seastrand Oil Company, Inc.

    E-Print Network [OSTI]

    Beadleston, Scott K.

    2008-12-19

    services, and expand opportunities for employees. Feedback from Ferguson Paper Company, Inc.’s 2003 acquisition of Seastrand Oil Company, Inc. (SOC)—Ferguson Paper Company, Inc.’s largest acquisition—could provide essential information to improve Ferguson...

  15. Does the location of a company’s global headquarters have an influence on its climate change awareness? 

    E-Print Network [OSTI]

    Shen, Zao

    This paper studies whether the location of a company’s global headquarters has an influence on its climate change awareness. The global headquarters hosting business elites from multinational companies are the surrogate ...

  16. Dow Chemical Company: Assessment Leads to Steam System Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dow Chemical Company: Assessment Leads to Steam System Energy Savings in a Petrochemical Plant Dow Chemical Company: Assessment Leads to Steam System Energy Savings in a...

  17. DOE Announces First Companies to Receive Industrial Energy Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Announces First Companies to Receive Industrial Energy Efficiency Certification DOE Announces First Companies to Receive Industrial Energy Efficiency Certification December 9,...

  18. New England Gas Company - Residential and Commercial Energy Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    England Gas Company - Residential and Commercial Energy Efficiency Rebate Programs New England Gas Company - Residential and Commercial Energy Efficiency Rebate Programs < Back...

  19. EA-223 CMS Marketing, Services and Trading Company | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Trading Company to export electric energy to Canada. EA-223 CMS Marketing, Services and Trading Company More Documents & Publications EA-232 OGE Energy Resources Inc EA-249...

  20. Columbus Southern Power Company (doing business as AEP Ohio)...

    Open Energy Info (EERE)

    Columbus Southern Power Company (doing business as AEP Ohio) Smart Grid Demonstration Project Jump to: navigation, search Project Lead Columbus Southern Power Company (doing...

  1. Electronic Document Management System PIA, BechtelJacobs Company...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management System PIA, BechtelJacobs Company, LLC Electronic Document Management System PIA, BechtelJacobs Company, LLC Electronic Document Management System PIA, BechtelJacobs...

  2. SEP Success Story: Louisiana Company Makes Switch to CNG, Helps...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SEP Success Story: Louisiana Company Makes Switch to CNG, Helps Transform Local Fuel Supplies SEP Success Story: Louisiana Company Makes Switch to CNG, Helps Transform Local Fuel...

  3. Researching Industries and Employers WHY RESEARCH A COMPANY?

    E-Print Network [OSTI]

    Yang, Eui-Hyeok

    Legal issues Regulatory issues Geography History Market Leaders External Resources for Researching the library Internal Resources for Researching a Specific Company Internal company information can be helpful

  4. Jiangxi Ganzhong Chlorine Caustic Company aka China Jiangxi Chlor...

    Open Energy Info (EERE)

    Jiangxi Ganzhong Chlorine Caustic Company aka China Jiangxi Chlor Alkali Manufacturing Jump to: navigation, search Name: Jiangxi Ganzhong Chlorine & Caustic Company (aka China...

  5. The changing face of Hanford security 1990--1994

    SciTech Connect (OSTI)

    Thielman, J.

    1995-12-01

    The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almost literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.

  6. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  7. Equity Options and Stochastic Interest Rates1

    E-Print Network [OSTI]

    Ouwehand, Peter

    M Acott February 14, 2006 1 The financial assistance of the Department of Labour (DoL) towards risk of equity options except around the Optimal Exercise Boundary of American options, but displays enhanced convexity (i.e. `Gamma'-type risks) over the stochastic interest rate model. #12;Acknowledgements

  8. FACULTY RESEARCH INTERESTS DAVID SOMERS (B)

    E-Print Network [OSTI]

    Rucci, Michele

    functional MRI, psychophysics, and computational modeling to investigate the mechanisms underlying perception in which unconscious thoughts about gender influence our understanding of the world and our assessments Interests of the Bullock lab are focused on the use of integrated computational models of local circuits

  9. MINING TEMPORAL SEQUENCES TO DISCOVER INTERESTING PATTERNS

    E-Print Network [OSTI]

    Holder, Lawrence B.

    MINING TEMPORAL SEQUENCES TO DISCOVER INTERESTING PATTERNS Edwin O. Heierman, III, G. Michael, Texas 76019-0015 {heierman, youngbld, cook@cse.uta.edu ABSTRACT When mining temporal sequences sequences. In this paper, we present a novel data mining technique based on the Minimum Description Length

  10. Technical Report Mining Interesting Sets and Rules

    E-Print Network [OSTI]

    Antwerpen, Universiteit

    Technical Report 09.02 Mining Interesting Sets and Rules in Relational Databases Bart Goethals, Wim Middelheimlaan 1 B-2020 Antwerp ­ Belgium #12;1 Abstract In this paper we propose a new and elegant approach toward the generalization of frequent itemset mining to the multi-relational case. We define relational

  11. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  12. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  13. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  14. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  15. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  16. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  17. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  18. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  19. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  20. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  1. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  2. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  3. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  4. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  5. Security of Bhutan: Walking Between the Giants

    E-Print Network [OSTI]

    Penjore, Dorji

    2004-01-01

    century, the British interests in Bhutan changed from trade to security following the Great Game between Russia, China and the British powers over the control of Central Asia. Bhutan too was then a political power to be reckoned with. While mighty... on Nepal, Bhutan saw China’s inability to become India’s substitute. Bhutan’s economy is strongly depended upon India. Hydro-power project built through Indian grant is the main revenue earner, and the coming mega-hydro projects dependent on Indian...

  6. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  7. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  8. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  9. Introducing a PMO in XYZ Company

    E-Print Network [OSTI]

    Alqahtani, Ahmed

    2013-12-20

    The purpose of this field project is to explore and build awareness about the main aspects—types, hierarchies, maturity models, and competency frameworks—related to establishing a Project Management Office (PMO) in a company. This study, inspired...

  10. Deere and Company Energy Management Program 

    E-Print Network [OSTI]

    Boyd, P. M.

    1980-01-01

    An overview of the Deere & Company energy management program is discussed. A review is made of seven key elements which have contributed to the success of the program. Installed projects and established programs are identified and discussed...

  11. Strategies of the major oil companies

    SciTech Connect (OSTI)

    Greene, W.N.

    1982-01-01

    This study identifies, documents, and analyzes the strategies of the seven largest oil companies in the world, collectively called the Majors (Exxon, Shell, Gulf, Mobil, Socal, Texaco, and BP). The period covered for each company begins at its origin, generally near 1900, and concludes in 1976. This study documents and analyzes all the major components of the long-term strategies of these companies since their origins. The policy components of each company's strategy are classified into six categories where major changes have occurred in the growth of the large-scale firm. These policy categories are geographic exapansion, size/scale of operations, vertical integration, horizontal combination, product and industry diversification, and administrative structure. With each category, policies can be compared between firms and overtime to illustrate similarities, differences, and changes in strategy. The main results are discussed.

  12. CompanieswithPNNLRoots All of these companies

    E-Print Network [OSTI]

    Eigenvector Research, Inc. ­ 1995 Encryptor, Inc. ­ 2006 Environmental Assessment Services ­ 2005 Exxon) ­ 2000 MicroStructure Technologies ­ 2005 MITAC ­ 1977 MK Altenhofen ­ 1990 mobileFOUNDATIONS, Inc. ­ 2001 Mobility Engineering Company ­ 1996 Mohr & Associates ­ 1983 Mundo Communications Network (then El

  13. Fall 2012 FUPWG Meeting Welcome: Southern Company

    Broader source: Energy.gov [DOE]

    Presentation—given at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—covers the Southern Company's retail service territory, financials, customers and sales, power generation, U.S. military projects, and more.

  14. Scientific Data Processing and Visualization Software Company

    E-Print Network [OSTI]

    Delene, David J.

    Scientific Data Processing and Visualization Software Company Dr. David J. Delene Department #12;The Solution ­ Proper Software Open-source software environment designed to provide scientifically Develop prototype of the Software House. Cloud-based environment. Virtual Machines. Assessment

  15. NREL: Technology Transfer - Kuwait Visitors Interested in NREL...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to improve energy efficiency in their refining operations. KOC may also apply concentrated solar power technology to produce some of the steam needed in the company's operations...

  16. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  17. The Corporate Headquarters for Alabama Power Company 

    E-Print Network [OSTI]

    Reardon, J. G.; Penuel, K. M.

    1987-01-01

    management systems are a prime objective f the company. Considerable attention has been give to the public information aspects during the desi n phase. The original equipment room layout and floor 478 ESL-IE-87-09-75 Proceedings from the Ninth Annual... tech nologies which are of mutual benefit to customer and utility. INTRODUCTION In order to consolidate all corporate head quarters personnel into a single facility, Alabama Power Company management initiated the design and construction of a...

  18. Company Template (Fixed Support) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergy Webinar:I DueBETOofforCompany Template (Fixed Support) Company

  19. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  20. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  1. Significant Financial Interest Disclosure Form -Page 1 Investigator Financial Conflict of Interest Disclosure Policy

    E-Print Network [OSTI]

    Kunkle, Tom

    freedom and research integrity. The objectivity of investigators is an essential element of scientific, not by other interests that could influence or undermine the scientific integrity of their work. Conflict, legal, or professional duties. The potential for personal gain or the existence of competing interests

  2. Supplier Disclosure of Conflict of Interest -2/2015 MSU Supplier Disclosure of Conflict of Interest

    E-Print Network [OSTI]

    Supplier Disclosure of Conflict of Interest - 2/2015 MSU Supplier Disclosure of Conflict of Interest As a supplier to Michigan State University (MSU), a state university and public institution, any to place either the supplier or employee in jeopardy. Purchasing will advise the employee and/or supplier

  3. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  4. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  5. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  6. CNG: Aiming to be an energy company, not a gas company

    SciTech Connect (OSTI)

    Wheatley, R.

    1997-06-30

    Long before regulatory changes in the US paved the way for the union of natural gas and electric utility companies, Consolidated Natural Gas Co. (CNG) embarked on a strategy that would serve the company well in the 1990s. In 1995, CNG began a corporate repositioning to meet mounting competition, switching emphasis from its regulated businesses to the non-regulated side. The goal: to become an energy player, not only in the US but internationally. This paper focuses on the company`s operations, business plans, and management strategies. The paper gives an overview, then discusses production of oil and gas, the growing exploration program and plans for the future.

  7. Vehicle for carrying an object of interest

    DOE Patents [OSTI]

    Zollinger, W. Thor (Idaho Falls, ID); Ferrante, Todd A. (Westerville, OH)

    1998-01-01

    A vehicle for carrying an object of interest across a supporting surface including a frame having opposite first and second ends; a first pair of wheels fixedly mounted on the first end of the frame; a second pair of wheels pivotally mounted on the second end of the frame; and a pair of motors borne by the frame, each motor disposed in driving relation relative to one of the pairs of wheels, the motors propelling the vehicle across the supporting surface.

  8. Vehicle for carrying an object of interest

    DOE Patents [OSTI]

    Zollinger, W.T.; Ferrante, T.A.

    1998-10-13

    A vehicle for carrying an object of interest across a supporting surface including a frame having opposite first and second ends; a first pair of wheels fixedly mounted on the first end of the frame; a second pair of wheels pivotally mounted on the second end of the frame; and a pair of motors borne by the frame, each motor disposed in driving relation relative to one of the pairs of wheels, the motors propelling the vehicle across the supporting surface. 8 figs.

  9. About Things We Don't Know Things We Don't Know is a community interest company, which seeks

    E-Print Network [OSTI]

    Evolution" and so on. These `Things' are then pulled from the database, and plunged into articles a vast database of unanswered questions which are grouped into the relating science (Physics, Chemistry

  10. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  11. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  12. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  13. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  14. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  15. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  16. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  17. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  18. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  19. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  20. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  1. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  2. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  3. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  4. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  5. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  6. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  7. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  8. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  9. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  10. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  11. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  12. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  13. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  14. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  15. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  16. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  17. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    OWNERSHIP, CONTROL OR INFLUENCE (FOCI) PROGRAM It is DOE policy to obtain information that indicates whether a company that SNL will enter into a contract with is Owned,...

  18. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  19. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  20. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  1. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  2. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  3. Process Control Security 44 PublishedbytheieeeComPutersoCiety1540-7993/08/$25.002008ieeeieeeseCurity&PrivaCy

    E-Print Network [OSTI]

    Correia, Miguel

    - structures such as power, water, gas, oil, and trans- portation. Therefore, the threat is no longer against a rather weak, form of security, essentially by obscurity. However, criti- cal infrastructure companies, and control and supervision proto- cols are normally encapsulated on top of UdP-TCP/ IP. The common defense

  4. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  5. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  6. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  8. Overview of the US Department of Energy Master Safeguards and Security Agreement program

    SciTech Connect (OSTI)

    Billings, M.P.; Duncan, M.R.; Craig, J.R.

    1988-06-01

    The Master Safeguards and Security Agreement establishes a contract between the US Department of Energy-Headquarters and a US Department of Energy regional Operations Office regarding protection strategies, protection system performance, and acceptability of risks for US Department of Energy Safeguards and Security interests at a facility or site. An approved Master Safeguards and Security Agreement defines the protection system performance baseline for evaluations, inspections, and audits, and can introduce exceptions to US Department of Energy orders. Responsibilities and authorities for development and approval of a Master Safeguards and Security Agreement are outlined in US Department of Energy Order 5630.13, ''Master Safeguards and Security Agreement'' and US Department of Energy Order 5630.xx, ''Safeguards and Security Planning Program'' (draft). To date, 14 Master Safeguards and Security Agreements have been approved by the US Department of Energy-Headquarters and about 34 are in preparation or review. A total of approximately 50 are anticipated before completion of the program. The Master Safeguards and Security agreement program has been positively received by both the US Department of Energy-Headquarters and the US Department of Energy Operations Offices, because it provides visibility as to the effectiveness of Safeguards and Security protection systems and affords a sensible foundation for security planning based on risk. 6 refs., 3 figs., 6 tabs.

  9. Cooperative monitoring of regional security agreements

    SciTech Connect (OSTI)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

    1995-08-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  10. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  11. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  12. Will Power Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowa (Utility Company)Idaho)VosslohWest PlainsAssn,WilderHill NewPower Company

  13. (Expired) Nationwide Limited Public Interest Waiver for LED Lighting...

    Energy Savers [EERE]

    (Expired) Nationwide Limited Public Interest Waiver for LED Lighting and HVAC Units: February 11, 2010 (Expired) Nationwide Limited Public Interest Waiver for LED Lighting and HVAC...

  14. UC Center for Information Technology Research in the Interest...

    Open Energy Info (EERE)

    Center for Information Technology Research in the Interest of Society (CITRIS) Jump to: navigation, search Logo: UC Center for Information Technology Research in the Interest of...

  15. Home Energy Score: Program Update for Interested Stakeholders...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Score: Program Update for Interested Stakeholders Home Energy Score: Program Update for Interested Stakeholders programupdatewebinar7-23-12.pdf More Documents & Publications Home...

  16. Updated May 2012 MILITARY ACCESSIONS VITAL TO NATIONAL INTEREST (MAVNI)

    E-Print Network [OSTI]

    Arnold, Jonathan

    Updated May 2012 MILITARY ACCESSIONS VITAL TO NATIONAL INTEREST (MAVNI) RECRUITMENT PILOT are considered to be vital to the national interest. Those holding critical skills ­ physicians, nurses

  17. Report to Congress: Expressions of interest in commercial clean coal technology projects in foreign countries

    SciTech Connect (OSTI)

    1995-06-01

    This report was prepared in response to the guidance provided by the Congress in the course of the Fiscal Year 1995 appropriations process for the Department of Energy`s (DOE) Office of Fossil Energy (FE). As described in detail below, DOE was directed to make the international dissemination of Clean Coal Technologies (CCTs) an integral part of its policy to reduce greenhouse gas emissions in developing countries. Congress directed DOE to solicit ``Statements of Interest`` in commercial projects employing CCTs in countries projected to have significant growth in greenhouse gas emissions. Additionally, DOE was asked to submit to the Congress a report that analyzes the information contained in the Statements of Interest, and that identifies the extent to which various types of Federal incentives would accelerate the commercial availability of these technologies in an international context. In response to DOE`s solicitation of 18 November 1994, 77 Statements of Interest were received from 33 companies, as well as five additional materials. The contents of these submittals, including the requested Federal incentives, the CCTs proposed, the possible host countries, and the environmental aspects of the Statements of Interest, are described and analyzed in the chapters that follow.

  18. Public Interest Energy Research (PIER) Program INTERIM PROJECT REPORT

    E-Print Network [OSTI]

    for the Smart Grid Information Assurance and Security Technology Assessment project (Contract Number 50008027 Generation · Industrial/Agricultural/Water EndUse Energy Efficiency · Renewable Energy Technologies

  19. Seawalls Are Not Enough: Climate Change & U.S. Interests

    E-Print Network [OSTI]

    Freeman, Jody; Guzman, Andrew

    2009-01-01

    natural gas, and electricity; (ii) manufactured goods; (iii) machinery and transport equipment (which includes See infra Part III.B (discussing the enhanced security

  20. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  1. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  2. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  3. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  4. Search Business News, Stocks, Funds, Companies

    E-Print Network [OSTI]

    Yaghi, Omar M.

    To capture the carbon dioxide generated by coal plants, chemical companies like Dow Chemical Co. and energy's Revival May Combat Climate Change Build a Better Carbon Trap and ... And Now, Climate Bill's Supporters and the bottom line. Go to Blog » Build a Better Carbon Trap and ... By PAUL VOOSEN of Published: June 30, 2009

  5. General Electric Company Oahu Wind Integration Study

    E-Print Network [OSTI]

    General Electric Company Oahu Wind Integration Study Final Report Delivered to: Richard Rocheleau dependent state in the nation. In 2008 this cost the state approximately $8.4 billion each year, which to integrate 400 MW of wind power located on the islands of Molokai and/or Lanai that could be transmitted

  6. ESTABLISHING A PRACTICAL COMPANY INNOVATIVE Emmanuel Maravelakis

    E-Print Network [OSTI]

    Aristomenis, Antoniadis

    present our methodology, the PIP-SCORE (Product Innovation Profile -SCORE), which is based on measuring, by measuring innovation and determining a product innovation profile. This is achieved by addressing three inter-related, but separately measurable, aspects of a company's innovation process- the products (or

  7. Online Advertising Insertion Order Form Company name

    E-Print Network [OSTI]

    McReynolds, Ben

    Online Advertising Insertion Order Form Advertiser Company name: Address: City: State: Zip: Contact: Billing Instructions Gross Amount : $ Net Amount: $ Please refer to 2014 Advertising Rate Sheet Less 15% agency discount or other applicable discount (please specify below): Send invoices to: Advertiser

  8. Vermont Wind Measurement Company Still Strong

    Broader source: Energy.gov [DOE]

    This small business has made products to help its customers measure and understand the potential of wind energy since 1982. Now, because of additional opportunities the Recovery Act has created for renewable energy companies, small businesses like this are poised to grow with the increased demand for proven wind measurement and turbine control equipment.

  9. Sample Job Offer Letter Best Company, Inc.

    E-Print Network [OSTI]

    Awtar, Shorya

    Sample Job Offer Letter Best Company, Inc. 1553 Job Street, Ann Arbor, MI 48105 (Tel) (734) 000 would like to offer (student's name here) an internship position. Below is the information you requested: 1553 Job Street, Ann Arbor, MI 48105 Number of hours worked per week: 40 Official offer beginning

  10. Disc Manufacturing, Inc. A QUIXOTE COMPANY

    E-Print Network [OSTI]

    Gupta, Varun

    Disc Manufacturing, Inc. A QUIXOTE COMPANY Introduction to ISO 9660, what it is, how it is implemented, and how it has been extended. Clayton Summers Copyright © 1993 by Disc Manufacturing, Inc. All rights reserved. #12;WHO IS DMI? Disc Manufacturing, Inc. (DMI) manufactures all compact disc formats (i

  11. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  12. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  13. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  14. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  15. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  16. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  17. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  18. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National