Powered by Deep Web Technologies
Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

2

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

3

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

4

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

5

Secure Data Center (Fact Sheet)  

DOE Green Energy (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

6

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

7

International | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

International | National Nuclear Security Administration International | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog International Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > International International U.S. Department of Energy / U.S. Nuclear Regulatory Commission

8

Center for Environment and National Security at Scripps | Open Energy  

Open Energy Info (EERE)

National Security at Scripps National Security at Scripps Jump to: navigation, search Logo: Center for Environment and National Security at Scripps Name Center for Environment and National Security at Scripps Place San Diego, California Website http://sio.ucsd.edu/cens/ References CENS - About[1] LinkedIn Connections Contents 1 Overview 2 Headlines 3 Resources 3.1 CENS Programs 3.2 CENS Tools 4 References Overview Center for Environment and National Security at Scripps is an organization based in San Diego, California. "The Center uses the formidable science and research capacity of Scripps Institution of Oceanography to clarify significant environmental impacts on our national security and international human security, thus bringing information to policy makers for the resolution of society's most pressing

9

International Potato Center POSITION ANNOUNCEMENT  

E-Print Network (OSTI)

International Potato Center POSITION ANNOUNCEMENT Ref.: 10-35/PDG/IRS/HQ Post ­Doctoral Appointment, Peru. The Center: CIP is a not-for-profit international agricultural research organization

Wang, Z. Jane

10

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Advisory: Cisco Content Services Gateway Vulnerabilities V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands...

11

RFI Comments - Advanced Cyber Security Center  

Science Conference Proceedings (OSTI)

Page 1. Page 1 of 3 Advanced Cyber Security Center Rollout ... The Need The advanced cyber threat is real and growing. ...

2013-04-09T23:59:59.000Z

12

Transportation Secure Data Center (TSDC) (Poster)  

DOE Green Energy (OSTI)

This poster on the Transportation Secure Data Center (TSDC) was presented at the Household Travel Survey Symposium on November 7, 2012.

Gonder, J.; Burton, E.; Wood, E.

2012-12-01T23:59:59.000Z

13

Security - Center for Transportation Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

successfully protect the surface transportation systems in an integrated and accessible cyber-secured environment. Primary Contact: Diane Davidson Focus Areas: integrated...

14

Changes related to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Changes related to "Center for Environment and National Security at Scripps" Center for Environment and National Security...

15

Pages that link to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Pages that link to "Center for Environment and National Security at Scripps" Center for Environment and National Security...

16

International | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

17

International Programs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Programs | National Nuclear Security Administration Programs | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration International Programs Home > About Us > Our Programs > Emergency Response > International Programs International Programs NNSA prepares for nuclear and radiological emergencies across the globe.

18

International Exercises | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Exercises | National Nuclear Security Administration Exercises | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog International Exercises Home > About Us > Our Programs > Emergency Response > International Programs > International Exercises International Exercises First responders test plans and procedures during a radiation exercise in Murman

19

Changes related to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Changes related to "Center for Environment and National Security at Scripps Feed" Center for Environment and National...

20

Pages that link to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Pages that link to "Center for Environment and National Security at Scripps Feed" Center for Environment and National...

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Los Alamos Neutron Science Center | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Neutron Science Center | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

22

Secure Data Center (Fact Sheet), Energy Systems Integration Facility...  

NLE Websites -- All DOE Office Websites (Extended Search)

engineering. Partners at the ESIF's Secure Data Center include: * Government agencies * Vehicle manufacturers * Transit agencies * Hydrogen suppliers * Fuel cell developers *...

23

T-560: Cisco Security Advisory: Management Center for Cisco Security Agent  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Cisco Security Advisory: Management Center for Cisco 0: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability February 18, 2011 - 7:00am Addthis PROBLEM: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability. PLATFORM: Cisco Security Agent software releases 5.1, 5.2, and 6.0 are affected by this vulnerability. Note: Only the Management Center for Cisco Security Agent is affected by this vulnerability. Cisco Security Agent installations on end-point workstations or servers are not affected by this vulnerability. ABSTRACT: The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote

24

National Nuclear Security Administration Service Center  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Service Center Service Center P. 0. Box 5400 ~ ~ ~ A d M m t b n Albuquerque, NM 87185 MEMORANDUM FOR: Scott Blake Harris, General Counsel, GC- 1, HQ FROM: Karen L. Boardman, Director * * SUBJECT: Annual National Environmental Policy Act Planning Summary for FY 201 1 In response to your memorandum of December 8,201 0, attached is the 20 1 1 Annual National Environmental Policy Act (NEPA) Planning Summary. The information is provided for the National Nuclear Security Administration, Service Center (NNSAISC) in Albuquerque, NM. Furthermore, in reply to the question, "Would a site-wide environmental impact statement facilitate future NEPA compliance efforts?" The general operations of this site can be described as administrative similar to those operations within the Forrestal building in D.C. Therefore, a

25

Global climate change and international security  

Science Conference Proceedings (OSTI)

On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

Rice, M.

1991-01-01T23:59:59.000Z

26

Operations Center | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

27

Control Systems Security Test Center - FY 2004 Program Summary  

Science Conference Proceedings (OSTI)

In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nations critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

Robert E. Polk; Alen M. Snyder

2005-04-01T23:59:59.000Z

28

Sandia National Laboratories: National Security Missions: International  

NLE Websites -- All DOE Office Websites (Extended Search)

WMD Counterterrorism & Response WMD Counterterrorism & Response Airworthiness Weapons of Mass Destruction (WMD) Counterterrorism & Response provides operational planning assistance and training to counter domestic and international nuclear and radiological terrorism, including: Specialized training for nuclear and explosive threats for warfighters and law enforcement Technologies for evaluating airframe integrity and other critical structural integrity Our partners include National Nuclear Security Administration (NNSA), Department of Defense (DoD), and Federal Aviation Administration (FAA). Program Areas include: Airworthiness and Infrastructure Assurance Nuclear Incident Response Nuclear Counterterrorism Chemical, Biological, Radiological, Nuclear and Explosives Technology Development

29

Nuclear Security Centers of Excellence: Fact Sheet | National Nuclear  

National Nuclear Security Administration (NNSA)

Centers of Excellence: Fact Sheet | National Nuclear Centers of Excellence: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security Centers of Excellence: Fact Sheet Fact Sheet Nuclear Security Centers of Excellence: Fact Sheet Mar 23, 2012 A Center of Excellence (COE) for nuclear security is a centralized location

30

Nuclear Security Centers of Excellence: Fact Sheet | National Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Centers of Excellence: Fact Sheet | National Nuclear Centers of Excellence: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security Centers of Excellence: Fact Sheet Fact Sheet Nuclear Security Centers of Excellence: Fact Sheet Mar 23, 2012 A Center of Excellence (COE) for nuclear security is a centralized location

31

Northwest Regional Technology Center, December 2012 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network (OSTI)

of Homeland Security's Domestic Nuclear Detection Office's Operations Support Directorate supports state Security December 2012 The Northwest Regional Technology Center (NWRTC) is a virtual resource center, response, and recovery. The center enables homeland security solutions for emergency responder communities

32

Global Safeguards and Security Educational Center Course Offerings  

E-Print Network (OSTI)

(Nuclear) ­ Course (1 week) POC: Bill Toth, 865.675.3738, tothwj@ornl.gov Security Safeguards#12;Global Safeguards and Security Educational Center Course Offerings Basic NonDestructive Assay) POC: Bert Rollen, 865.241.4343, rollenhyjr@ornl.gov Principles of Nuclear Material Process Holdup

33

National Atmospheric Release Advisory Center | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Atmospheric Release Advisory Center | National Nuclear Security Atmospheric Release Advisory Center | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog National Atmospheric Release Advisory Center Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Consequence Management > National Atmospheric Release Advisory Center

34

The Office of Nonproliferation and International Security Policy...  

NLE Websites -- All DOE Office Websites (Extended Search)

Our Jobs Our Jobs Working at NNSA Blog The Office of Nonproliferation and International Security Policy Home > About Us > Our Programs > Nonproliferation > Nonproliferation &...

35

NNSA summer interns tour Sandia | National Nuclear Security Administra...  

NLE Websites -- All DOE Office Websites (Extended Search)

summer interns tour Sandia | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

36

ESPC Sucess Story - Harold Washington Social Security Administration Center  

NLE Websites -- All DOE Office Websites (Extended Search)

HAROLD WASHINGTON HAROLD WASHINGTON SOCIAL SECURITY ADMINISTRATION CENTER CHICAGO, ILLINOIS Water Conservation and Green Energy ESPC SUCCESS STORY The Harold Washington Social Security Center in Chicago, IL, installed numerous energy conservation measures using direct financing and Energy Savings Performance Contracts (ESPCs). These measures include: a 110-kilowatt, rooftop solar electric system; energy efficient lighting fixtures and controls; retro- commissioning and energy management control system upgrades; chilled water system improve- ments; HVAC improvements; low-flow fixtures and waterless urinals. These projects reduce the Center's annual energy consumption by more than 20 percent - a total of more than 4 million kWh - and save 2 million gallons of water each year.

37

ESPC Sucess Story - Harold Washington Social Security Administration Center  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HAROLD WASHINGTON HAROLD WASHINGTON SOCIAL SECURITY ADMINISTRATION CENTER CHICAGO, ILLINOIS Water Conservation and Green Energy ESPC SUCCESS STORY The Harold Washington Social Security Center in Chicago, IL, installed numerous energy conservation measures using direct financing and Energy Savings Performance Contracts (ESPCs). These measures include: a 110-kilowatt, rooftop solar electric system; energy efficient lighting fixtures and controls; retro- commissioning and energy management control system upgrades; chilled water system improve- ments; HVAC improvements; low-flow fixtures and waterless urinals. These projects reduce the Center's annual energy consumption by more than 20 percent - a total of more than 4 million kWh - and save 2 million gallons of water each year.

38

International Export Control Cooperation | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

39

International Exercises | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

40

International Engagement | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

International Partners | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

42

Office of Nonproliferation & International Security | National...  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

43

Technology Applications Center | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Applications Technology Applications ... Technology Applications Center The Y-12 Technology Applications Center, established with more than 20 years of testing and evaluation experience at the Y-12 National Security Complex, provides a dedicated resource to technology providers and groups procuring security technologies. Y-12 TAC helps determine a security technology's value by testing in real-world settings. As an unbiased and independent organization, Y-12 TAC provides a qualitative look at the technology's performance and answers the tough question: "Will the system work effectively when needed?" Our customers can reliably draw upon on Y-12's extensive experience with and expertise in many current security technologies. Both the technology provider and the technology buyer derive significant

44

Pantex night held at discovery center | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

night held at discovery center | National Nuclear Security night held at discovery center | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Pantex night held at discovery center Pantex night held at discovery center Posted By Office of Public Affairs More than 500 Pantexans and their families attended Pantex Night at the Don

45

Pantex night held at discovery center | National Nuclear Security  

National Nuclear Security Administration (NNSA)

night held at discovery center | National Nuclear Security night held at discovery center | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Pantex night held at discovery center Pantex night held at discovery center Posted By Office of Public Affairs More than 500 Pantexans and their families attended Pantex Night at the Don

46

PACIFIC NORTHWEST NATIONAL LABORATORY'S CENTER FOR GLOBAL SECURITY  

E-Print Network (OSTI)

HOSTED BY: · PACIFIC NORTHWEST NATIONAL LABORATORY'S CENTER FOR GLOBAL SECURITY · THE NUCLEAR the Comprehensive Nuclear Test Ban Treaty Wednesday, December 14, 2011 10 a.m. ­ 11:30 a.m. in the Battelle Nuclear-Test Ban Treaty Organization (CTBTO) Preparatory Commission in Vienna, Austria Dr. Gaya

47

A task and technical support sensitive Security Operations Center  

Science Conference Proceedings (OSTI)

Modern security control and display systems for protected facilities have improved the effectiveness of Security Operations Center (SOC) personnel. The most effective of these utilize sophisticated computerized systems to primarily provide quick and accurate control and display of alarm associated and routine access funcitions. Protected facilities with limited fiscal resources require some type of security control and display system but often cannot justify the cost of equipment and technical support associated with sophisticated systems. This paper describes a disign approach, consisting of four independent building blocks, that provides functionality and complexity commensurate with facility-specific requirements and technical support capabilities. The versatility of the design is demonstrated by showing how the less complex blocks satsify the needs of fiscally limited facilities or the blocks can be intergrated to satisfy the needs of the largest security installations. also, the independent blocks can be intergrated into existing installations to provide needed additional functionality with minimal impact on operations and exisiting equipment. 7 figs.

Newell, R.A.; Sena, P.A.; Salazar, J.S.

1988-01-01T23:59:59.000Z

48

Statement to the IAEA International Conference on Nuclear Security |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to the IAEA International Conference on Nuclear Security to the IAEA International Conference on Nuclear Security Statement to the IAEA International Conference on Nuclear Security July 1, 2013 - 2:19pm Addthis NEWS MEDIA CONTACT (202) 586-4940 AS PREPARED FOR DELIVERY Secretary of Energy Ernest Moniz U.S. Statement to the IAEA International Conference on Nuclear Security Vienna, Austria Monday, July 1, 2013 I want to acknowledge Director General Amano and the President of the Conference, Foreign Minister Martonyi, for their dedicated efforts in organizing this important conference. I also want to express my gratitude to my fellow ministers for their commitment to the issue at hand and for taking the time to engage personally in this serious discussion. In the past two weeks, President Obama has given major speeches on two of

49

Statement to the IAEA International Conference on Nuclear Security |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Statement to the IAEA International Conference on Nuclear Security Statement to the IAEA International Conference on Nuclear Security Statement to the IAEA International Conference on Nuclear Security July 1, 2013 - 2:19pm Addthis NEWS MEDIA CONTACT (202) 586-4940 AS PREPARED FOR DELIVERY Secretary of Energy Ernest Moniz U.S. Statement to the IAEA International Conference on Nuclear Security Vienna, Austria Monday, July 1, 2013 I want to acknowledge Director General Amano and the President of the Conference, Foreign Minister Martonyi, for their dedicated efforts in organizing this important conference. I also want to express my gratitude to my fellow ministers for their commitment to the issue at hand and for taking the time to engage personally in this serious discussion. In the past two weeks, President Obama has given major speeches on two of

50

Proceedings of the 2011 International Conference on Communication, Computing & Security  

Science Conference Proceedings (OSTI)

It gives us a great pleasure in welcoming you to the International Conference on Communication, Computing & Security (ICCCS2011), to be held at National Institute of Technology Rourkela, Odisha, India from February 12-14, 2011. This year, NIT Rourkela ...

Sanjay Kumar Jena; Rajeev Kumar; Ashok Kumar Turuk; Manoranjan Dash

2011-02-01T23:59:59.000Z

51

Center for Environment and National Security at Scripps Feed | Open Energy  

Open Energy Info (EERE)

Environment and National Security at Scripps Feed Environment and National Security at Scripps Feed Jump to: navigation, search Home | About | Inventory | Partnerships | Capacity Building | Webinars | Reports | Events | News | List Serve CLEAN Member Feeds Center for Environment and National Security at Scripps Centro de Energías Renovables (CER) The Children's Investment Fund Foundation (CIFF) Climate and Development Knowledge Network (CDKN) Climate Technology Initiative (CTI) ClimateWorks Foundation Coalition for Rainforest Nations (CfRN) Ecofys Energy Research Centre of the Netherlands (ECN) Energy Sector Management Assistance Program of the World Bank (ESMAP) Environment and Development Action in the Third World (ENDA-TM) German Aerospace Center (DLR) German Agency for International Cooperation (GIZ) Global Village Energy Partnership (GVEP)

52

Los Alamos CCS (Center for Computer Security) formal computer security model  

SciTech Connect

This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

53

Sandia Weapon Intern Program visits KCP | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Weapon Intern Program visits KCP | National Nuclear Security Weapon Intern Program visits KCP | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Sandia Weapon Intern Program visits KCP Sandia Weapon Intern Program visits KCP Posted By Office of Public Affairs Participants in Sandia's Weapon Intern Program recently visited and

54

Alternative Fuels Data Center: Alternative Fuel Definition - Internal  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Alternative Fuel Alternative Fuel Definition - Internal Revenue Code to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel Definition - Internal Revenue Code on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel Definition - Internal Revenue Code on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel Definition - Internal Revenue Code on Google Bookmark Alternative Fuels Data Center: Alternative Fuel Definition - Internal Revenue Code on Delicious Rank Alternative Fuels Data Center: Alternative Fuel Definition - Internal Revenue Code on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel Definition - Internal Revenue Code on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

55

Office of the Assistant General Counsel for International and National Security Programs  

Energy.gov (U.S. Department of Energy (DOE))

The Office of the Assistant General Counsel for International and National Security Programs provides legal advice in support of DOE defense and national security programs, intelligence and counter...

56

Alternative Fuels Data Center: Energy Independence and Security Act of 2007  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Independence Independence and Security Act of 2007 (P.L. 110-140) to someone by E-mail Share Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Facebook Tweet about Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Twitter Bookmark Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Google Bookmark Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Delicious Rank Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Digg Find More places to share Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on AddThis.com... More in this section...

57

Virtual International Research/Education Center: Energy Saving LEDs  

Science Conference Proceedings (OSTI)

This paper presents an establish and operation of energy saving LEDs virtual international research/education center. This is a long-term international engineering education and research collaboration program among California Polytechnic State University ... Keywords: Virtual, research/education center, LEDs

Xiaomin Jin, Xiao-Hua Yu, Xiang-Ning Kang, Guo-Yi Zhang, Guifang Dong

2013-07-01T23:59:59.000Z

58

Carnegie Endowment for International Peace: Moscow Center | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Carnegie Endowment for International Peace: Moscow Center Carnegie Endowment for International Peace: Moscow Center Carnegie Endowment for International Peace: Moscow Center March 16, 2006 - 11:53am Addthis Remarks as Prepared for Secretary Bodman Thank you . . . I'm pleased to be here. I'd like to thank the Carnegie Endowment's Moscow Center for hosting this event. Here in Moscow - as in Washington and around the world - the Carnegie Endowment has distinguished itself as a relevant player in nearly all policy debates related to international affairs . . . going beyond the academic to offer concrete, practical policy guidance and to educate the global public. I would also stress the importance of the Endowment's significant presence here in Moscow. It is one thing to provide scholarly "advice" from across

59

Establishing a Secure Data Center with Remote Access: Preprint  

DOE Green Energy (OSTI)

Access to existing travel data is critical for many analysis efforts that lack the time or resources to support detailed data collection. High-resolution data sets provide particular value, but also present a challenge for preserving the anonymity of the original survey participants. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory and the U.S. Department of Transportation have launched the Transportation Secure Data Center (TSDC). TSDC data sets include those from regional travel surveys and studies that increasingly use global positioning system devices. Data provided by different collecting agencies varies with respect to formatting, elements included and level of processing conducted in support of the original purpose. The TSDC relies on a number of geospatial and other analysis tools to ensure data quality and to generate useful information outputs. TSDC users can access the processed data in two different ways. The first is by downloading summary results and second-by-second vehicle speed profiles (with latitude/longitude information removed) from a publicly-accessible website. The second method involves applying for a remote connection account to a controlled-access environment where spatial analysis can be conducted, but raw data cannot be removed.

Gonder, J.; Burton, E.; Murakami, E.

2012-04-01T23:59:59.000Z

60

International Fertilizer Development Center (IFDC) Employment Opportunity in Washington, DC  

E-Print Network (OSTI)

International Fertilizer Development Center (IFDC) Employment Opportunity in Washington, DC Science and Technology Officer - VFRC IFDC has launched the Virtual Fertilizer Research Center (VFRC), a global research, website, other media) 5. Liaison with VFRC BoA Science Committee, IFDC RDD and other technical bodies

Ma, Lena

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Texas A&M's international campuses, centers and  

E-Print Network (OSTI)

Texas A&M's international campuses, centers and institutes: · Texas A&M University at Qatar, Doha with Students from Cultures around the World Texas A&M offers students the unique ability to gain exposure. Texas A&M boasts a branch campus located in Doha, Qatar, as well as 121 active international agreements

62

Windows 7 Configuration for UR_RC_InternalSecure Page 1 of 4 http://www.rochester.edu/it/wireless  

E-Print Network (OSTI)

Windows 7 Configuration for UR_RC_InternalSecure Page 1 of 4 http_RC_InternalSecure" wireless network Ensure that "Connect automatically" is checked Click Connect #12;Windows 7 are connecting to UR_RC_InternalSecure. #12;Windows 7 Configuration for UR_RC_InternalSecure Page 3

Portman, Douglas

63

Proceedings of the 2nd international conference on Security of information and networks  

Science Conference Proceedings (OSTI)

It is our great pleasure to welcome you to the 2nd International Conference on Security of Information and Networks -- SIN 2009, this year organized in technical cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC). ...

Atilla Eli; Oleg Makarevich; Mehmet Orgun; Alexander Chefranov; Josef Pieprzyk; Yuri Anatolievich Bryukhomitsky; S?dd?ka Berna rs

2009-10-01T23:59:59.000Z

64

FACT SHEET: Fusion Center Assessment emergency response, public health and private sector security personnel to understand local intelligence  

E-Print Network (OSTI)

FACT SHEET: Fusion Center Assessment emergency response, public health and private sector security officials to better protect their communities. Fusion centers provide interdisciplinary expertise on Fusion Center Assessment: A mature, fully functioning national network of fusion centers is critical

65

Applications of shape analysis to domestic and international security.  

SciTech Connect

The rapidly growing area of cooperative international security calls for pervasive deployment of smart sensors that render valuable information and reduce operational costs and errors. Among the sensors used, vision sensors are by far the most versatile, tangible, and rich in the information they provide about their environment. On the flip side, they are also the most complex to analyze automatically for the extraction of high-level information. The ability to process imagery in a useful manner requires at least partial functional emulation of human capabilities of visual understanding. Of all visual cues available in image data, shape is perhaps the most important for understanding the content of an image. In this paper we present an overview of ongoing research at LANL on geometric shape analysis. The objective of our research is to develop a computational framework for multiscale characterization, analysis, and recognition of shapes. This framework will enable the development of a comprehensive and connected body of mathematical methods and algorithms, based on the topological, metrical, and morphological properties of shapes. We discuss its potential applications to automated surveillance, monitoring, container tracking and inspection, weapons dismantlement, and treaty verification. The framework will develop a geometric filtering scheme for extracting semantically salient shape features. This effort creates a paradigm for solving shape-related problems in Pattern Recognition, Computer Vision, and Image Understanding in a conceptually cohesive and algorithmically amenable manner. The research aims to develop an advanced image analysis capability at LANL for solving a wide range of problems in automated facility surveillance, nuclear materials monitoring, treaty verification, and container inspection and tracking. The research provides the scientific underpinnings that will enable us to build smart surveillance cameras, with a direct practical impact on LANL's capabilities in domestic and international safeguards and security.

Prasad, Lakshman; Skourikhine, A. N. (Alexei N.); Doak, J. E. (Justin E.)

2002-01-01T23:59:59.000Z

66

Windows Mobile Configuration for UR_RC_InternalSecure (early release) Page 1 of 1  

E-Print Network (OSTI)

Windows Mobile Configuration for UR_RC_InternalSecure (early release) Page 1 of 1 There are no screen shots for Windows Mobile at this time. 1. Click the start button which appears as the windows_RC_InternalSecure" as "Connected"; 14. Click the "OK" indicator at upper right portion of that window and you'll return connected

Portman, Douglas

67

The Office of Nonproliferation and International Security Policy...  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

68

Security in a World CIsaC center for international  

E-Print Network (OSTI)

j . Phycol. 17, 346-352 (1981) SORPTION OF PLUTONIUM-237 BY TWO SPECIES OF MARINE PHYTOPLANKTON factor; phytoplankton, ma- rine; radionuclide; plutonium-237; sorption kinetics, pas- sive mechanism in the biological control of radionuclide distribtuion in aquatic systems. Algae, when exposed to plutonium

Cavalli-Sforza, Luigi

69

(International Energy Agency Heat Pump Center Working Team meeting)  

SciTech Connect

The traveler, serving as Delegate from the United States Heat Pump Center National Team, participated in the activities of the second International Energy Agency Heat Pump Center (IEA-HPC) Working Team meeting. This included a 20 minute presentation by the traveler about the Development and Activities of the IEA Heat Pump Center US National Team.'' Highlights of this meeting included development of 1991 IEA-HPC work plans including a prioritization of activities, introduction of the newly appointed IEA-HPC Advisory Board, and discussion of a new IEA Clearinghouse Network initiative. Pre-meeting discussions were held with IEA-HPC staff members which focused on US Heat Pump Center National Team contributions to the IEA-HPC Newsletter and participation in other IEA-HPC sponsored activities.

Broders, M.A.

1990-11-20T23:59:59.000Z

70

Nuclear Detection and Sensor Testing Center | Y-12 National Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Detection and ... Detection and ... Nuclear Detection and Sensor Testing Center As part of our increased global nuclear nonproliferation efforts, Y-12 commissioned the Nuclear Detection and Sensor Testing Center, which offers dedicated facilities for the testing of radiation detection capabilities using enriched and highly enriched uranium. In addition to supporting measurements of instrumentation for detecting ionizing radiation, non-destructive measurements of both fissile and non-fissile materials may be deployed at NDSTC. The NDSTC supports proliferation detection, nuclear safeguards, emergency response, treaty verification, and university research. We can test devices with various forms and quantities of HEU, and the Center offers subject matter experts to assist in planning measurements, safely deploy material,

71

International Center for Environmental, Social, and Policy Studies | Open  

Open Energy Info (EERE)

Environmental, Social, and Policy Studies Environmental, Social, and Policy Studies Jump to: navigation, search Logo: International Center for Environmental, Social, and Policy Studies Name International Center for Environmental, Social, and Policy Studies Address PO BOX 79246 Place Nairobi, Kenya Phone number +254-02-252969 Website http://www.icesps.org/ Coordinates -1.274359°, 36.813106° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":-1.274359,"lon":36.813106,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

72

International Center for Environmental Technology Transfer | Open Energy  

Open Energy Info (EERE)

Transfer Transfer Jump to: navigation, search Logo: International Center for Environmental Technology Transfer Name International Center for Environmental Technology Transfer Place Yokkaichi, Japan Year founded 1990 Coordinates 34.9651567°, 136.6244847° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":34.9651567,"lon":136.6244847,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

73

International Center for Climate Governance | Open Energy Information  

Open Energy Info (EERE)

Governance Governance Jump to: navigation, search Logo: International Center for Climate Governance Name International Center for Climate Governance Address Island of San Giorgio Maggiore I-30124, Place Venice, Italy Phone number +39 041 2700411 Website http://www.iccgov.org/index.ht Coordinates 45.4280556°, 12.3436111° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":45.4280556,"lon":12.3436111,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

74

Center for International Forestry Research | Open Energy Information  

Open Energy Info (EERE)

Research Research Jump to: navigation, search Logo: Center for International Forestry Research Name Center for International Forestry Research Address Jalan CIFOR Situ Gede Place Bogor Barat, Indonesia Phone number 62-251-8622-622 Website http://www.cifor.cgiar.org Coordinates -6.558301°, 106.755187° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":-6.558301,"lon":106.755187,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

75

Oilseeds: at the center of food, water, and energy security  

Science Conference Proceedings (OSTI)

Readers have indicated the sustainable use of food, water, and energy by the worlds growing population will be the most pressing challenge. Here, inform explores the interrelatedness of these critical resources. Oilseeds: at the center of food, water, and

76

Composite Data Products (CDPs) from the Hydrogen Secure Data Center (HSDC) at NREL's Energy Systems Integration Facility (ESIF)  

DOE Data Explorer (OSTI)

The Hydrogen Secure Data Center (HSDC) at NREL's Energy Systems Integration Facility (ESIF) plays a crucial role in NREL's independent, third-party analysis of hydrogen fuel cell technologies in real-world operation. NREL partners submit operational, maintenance, safety, and cost data to the HSDC on a regular basis. NREL's Technology Validation Team uses an internal network of servers, storage, computers, backup systems, and software to efficiently process raw data, complete quarterly analysis, and digest large amounts of time series data for data visualization. While the raw data are secured by NREL to protect commercially sensitive and proprietary information, individualized data analysis results are provided as detailed data products (DDPs) to the partners who supplied the data. Individual system, fleet, and site analysis results are aggregated into public results called composite data products (CDPs) that show the status and progress of the technology without identifying individual companies or revealing proprietary information. These CDPs are available from this NREL website: 1) Hydrogen Fuel Cell Vehicle and Infrastructure Learning Demonstration; 2) Early Fuel Cell Market Demonstrations; 3) Fuel Cell Technology Status [copied with editing from http://www.nrel.gov/hydrogen/facilities_secure_data_center.html].

77

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

78

Security computing for the resiliency of protecting from internal attacks in distributed wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their ... Keywords: distributed wireless sensor networks, internal attacks, resiliency, security computing, sensor optimum deployment

Xu Huang; Dharmendra Sharma; Muhammad Ahmed

2012-09-01T23:59:59.000Z

79

Assuaging Nuclear Energy Risks: The Angarsk International Uranium Enrichment Center  

Science Conference Proceedings (OSTI)

The recent nuclear renaissance has motivated many countries, especially developing nations, to plan and build nuclear power reactors. However, domestic low enriched uranium demands may trigger nations to construct indigenous enrichment facilities, which could be redirected to fabricate high enriched uranium for nuclear weapons. The potential advantages of establishing multinational uranium enrichment sites are numerous including increased low enrichment uranium access with decreased nuclear proliferation risks. While multinational nuclear initiatives have been discussed, Russia is the first nation to actualize this concept with their Angarsk International Uranium Enrichment Center (IUEC). This paper provides an overview of the historical and modern context of the multinational nuclear fuel cycle as well as the evolution of Russia's IUEC, which exemplifies how international fuel cycle cooperation is an alternative to domestic facilities.

Myers, Astasia [Stanford University, Stanford, CA 94305, USA and MonAme Scientific Research Center, Ulaanbaatar (Mongolia)

2011-06-28T23:59:59.000Z

80

International Center for Appropriate & Sustainable Technology | Open Energy  

Open Energy Info (EERE)

Appropriate & Sustainable Technology Appropriate & Sustainable Technology Jump to: navigation, search Logo: International Center for Appropriate & Sustainable Technology Name International Center for Appropriate & Sustainable Technology Address 8745 W 14th Ave Ste 200 Place Lakewood, CO Zip 80215 Sector Services Product Educating and Training Year founded 2002 Number of employees 11-50 Phone number 866.590.4377 Website http://www.icastusa.org/ Coordinates 39.7387749°, -105.094165° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.7387749,"lon":-105.094165,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Sandia Weapon Intern Program visits KCP | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Participants in Sandia's Weapon Intern Program recently visited and toured NNSA's Kansas City Plant. The program, established in 1998, was created to meet Sandia's changing mission...

82

Solar heating and cooling in the Los Alamos National Security and Resources Study Center  

DOE Green Energy (OSTI)

A description is given of the solar energy system for the National Security and Resources Study Center, a conference center and library at the Los Alamos Scientific Laboratory, Los Alamos, New Mexico. The solar heating and cooling system makes use of selectively coated collectors, hot storage, cold storage, night evaporative cold storage, heat recovery, a lithium bromide chiller, and a Rankine-cycle chiller. Data are given for the performance of the system for the years 1978 and 1979. The solar energy system has provided 76% of the energy required to heat the building and 97% of the thermal energy required to cool the building.

Hedstrom, J.C.; Murray, H.S.

1980-12-01T23:59:59.000Z

83

Data acquisition and monitoring system for Los Alamos National Security and Resources Study Center  

DOE Green Energy (OSTI)

The National Security and Resources Study Center, a modern, three level building containing 5574 m/sup 2/ of temperature controlled space and an integral solar energy heating and cooling system is in operation at Los Alamos, New Mexico. The instrumentation system used to measure the energy production (solar energy system) and consumption (HVAC system) in all the building operating modes is described. Included are descriptions of the sensors (temperature, mass flow, power, etc.) and the data acquisition system.

Trump, M.A.

1978-01-01T23:59:59.000Z

84

Transportation Secure Data Center: Real-World Data for Value Pricing and Tolling Research (Fact Sheet)  

SciTech Connect

The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Location and time-of-day variable tolling research, Mileage-based fee analysis, Travel demand modeling and transit planning, Congestion mitigation research, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

Not Available

2013-01-01T23:59:59.000Z

85

Transportation Secure Data Center: Real-World Data for Planning, Modeling and Analysis (Fact Sheet)  

SciTech Connect

The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database gives, metropolitan planning organizations, universities, national laboratories, air quality management districts, disaster planning agencies and auto manufacturers free-of-charge web-based access to valuable transportation data. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

Not Available

2013-01-01T23:59:59.000Z

86

Transportation Secure Data Center: Real-World Data for Environmental and Air Quality Analysis (Fact Sheet)  

SciTech Connect

The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Emissions and air pollution modeling, Vehicle energy and power analysis, Climate change impact studies, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

Not Available

2013-01-01T23:59:59.000Z

87

National Center for Nuclear Security: The Nuclear Forensics Project (F2012)  

Science Conference Proceedings (OSTI)

These presentation visuals introduce the National Center for Nuclear Security. Its chartered mission is to enhance the Nations verification and detection capabilities in support of nuclear arms control and nonproliferation through R&D activities at the NNSS. It has three focus areas: Treaty Verification Technologies, Nonproliferation Technologies, and Technical Nuclear Forensics. The objectives of nuclear forensics are to reduce uncertainty in the nuclear forensics process & improve the scientific defensibility of nuclear forensics conclusions when applied to nearsurface nuclear detonations. Research is in four key areas: Nuclear Physics, Debris collection and analysis, Prompt diagnostics, and Radiochemistry.

Klingensmith, A. L.

2012-03-21T23:59:59.000Z

88

Intern experience at the Center for Urban Programs: an internship report  

E-Print Network (OSTI)

This report discusses the author's internship at Texas A&M University Center for Urban Programs from May, 1978 through February, 1979. The objectives of the internship were to: 1. Increase the intern's technical competence in problems facing local governments; 2. Improve the administration of the Center for Urban Programs so that the Center can more effectively serve Texas local governments; and 3. Gain insight into the decision making process of local governments by active participation. The intern's responsibilities included work on Center staff-directed research projects, Center-coordinated research projects, and Center administration. The intern's major project responsibilities included directing the Community Energy Conservation project of the Texas Energy Extension Service, developing a street maintenance priority ranking system for the City of Denton, serving as University Coordinator for the Garland Urban Observatory and devising a Budget Forecasting System for the Center. To accomplish the third objective, the author served on the College Station Parks and Recreation Board during the internship. In evaluating the internship, the intern found that it fulfilled all the objectives set forth by the intern, his internship supervisor, and his academic committee chairman. The intern increased his technical competence in solving problems facing local governments. He effectively handled administrative responsibilities at the Center and he participated in the decision making process of a local government. The intern also developed personal contacts with local, state, and federal government officials.

Kerbel, Richard (Richard Ira), 1950-

1979-05-01T23:59:59.000Z

89

Report of a workshop on nuclear forces and nonproliferation Woodrow Wilson international center for scholars, Washington, DC October 28, 2010  

Science Conference Proceedings (OSTI)

A workshop sponsored by the Los Alamos National Laboratory in cooperation with the Woodrow Wilson International Center for Scholars was held at the Wilson Center in Washington, DC, on October 28, 2010. The workshop addressed evolving nuclear forces and their impacts on nonproliferation in the context of the new strategic environment, the Obama Administration's Nuclear Posture Review and the 2010 NPT Review Conference. The discussions reflected the importance of the NPR for defining the role of US nuclear forces in dealing with 21st century threats and providing guidance for National Nuclear Security Administration (NNSA) and Department of Defense (DoD) programs and, for many but not all participants, highlighted its role in the successful outcome of the NPT RevCon. There was widespread support for the NPR and its role in developing the foundations for a sustainable nuclear-weapon program that addresses nuclear weapons, infrastructure and expertise in the broader nonproliferation, disarmament and international security contexts. However, some participants raised concerns about its implementation and its long-term effectiveness and sustainability.

Pilat, Joseph F [Los Alamos National Laboratory

2010-12-08T23:59:59.000Z

90

Proceedings of the 2012 Joint International Conference on Human-Centered Computer Environments  

Science Conference Proceedings (OSTI)

This international forum invites scientists, teachers, researchers and lecturers to share their recent achievements in research and teaching, and findings in areas related to human-centered computer environments. The conference unites the following three ...

Alexander Vazhenin; Jens Herder; Kenjiro Miura

2012-03-01T23:59:59.000Z

91

B&W Y-12 donates $75,000 to Emory Valley Center | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Y-12 donates $75,000 to Emory Valley Center | National Nuclear Security Y-12 donates $75,000 to Emory Valley Center | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > B&W Y-12 donates $75,000 to Emory Valley Center B&W Y-12 donates $75,000 to Emory Valley Center Posted By Office of Public Affairs B&W Y-12 President and General Manager Chuck Spencer, pictured at left, and

92

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

93

Bank for International Settlements European Central Bank International Monetary Fund Handbook on Securities Statistics Second draft of part one: debt securities issuesSUMMARY  

E-Print Network (OSTI)

Section 2: Main features of debt securities........................................................................... 10 Section 3: Institutional units and sectors.............................................................................. 13 Section 4: Securitisation....................................................................................................... 20

unknown authors

2009-01-01T23:59:59.000Z

94

National Nuclear Security Administration Service Center Environmental Programs Long-Term Environmental Stewardship Baseline Handbook  

SciTech Connect

As environmental restoration (ER) projects move toward completion, the planning, integration, and documentation of long-term environmental stewardship (LTES) activities is increasingly important for ensuring smooth transition to LTES. The Long-Term Environmental Stewardship Baseline Handbook (Handbook) prepared by the National Nuclear Security Administration (NNSA) Service Center Environmental Programs Department (EPD) outlines approaches for integrating site-specific LTES planning and implementation into site ER baseline documentation. Since LTES will vary greatly from site to site, the Handbook also provides for flexibility in addressing LTES in ER Project life-cycle baselines, while clearly identifying Environmental Management (EM) requirements. It provides suggestions for enacting LTES principles and objectives through operational activities described in site-specific LTES plans and life cycle ER Project baseline scope, cost, and schedule documentation and tools for more thorough planning, better quantification, broader understanding of risk and risk management factors, and more comprehensive documentation. LTES planning applied to baselines in a phased approach will facilitate seamlessly integrating LTES into site operational activities, thereby minimizing the use of resources.

Griswold, D. D.; Rohde, K.

2003-02-26T23:59:59.000Z

95

Global climate change and international security. Report on a conference held at Argonne National Laboratory, May 8--10, 1991  

Science Conference Proceedings (OSTI)

On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

Rice, M.

1991-12-31T23:59:59.000Z

96

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

97

Transportation Secure Data Center: Real-World Data for Transportation Planning and Land Use Analysis (Fact Sheet)  

Science Conference Proceedings (OSTI)

The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Transit planning, Travel demand modeling, Homeland Security evacuation planning, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

Not Available

2013-01-01T23:59:59.000Z

98

Nuclear safety research collaborations between the U.S. and Russian Federation International Nuclear Safety Centers  

SciTech Connect

The Russian Federation Ministry for Atomic Energy (MINATOM) and the US Department of Energy (USDOE) have formed International Nuclear Safety Centers to collaborate on nuclear safety research. USDOE established the US Center (ISINSC) at Argonne National Laboratory (ANL) in October 1995. MINATOM established the Russian Center (RINSC) at the Research and Development Institute of Power Engineering (RDIPE) in Moscow in July 1996. In April 1998 the Russian center became a semi-independent, autonomous organization under MINATOM. The goals of the center are to: Cooperate in the development of technologies associated with nuclear safety in nuclear power engineering; Be international centers for the collection of information important for safety and technical improvements in nuclear power engineering; and Maintain a base for fundamental knowledge needed to design nuclear reactors. The strategic approach is being used to accomplish these goals is for the two centers to work together to use the resources and the talents of the scientists associated with the US Center and the Russian Center to do collaborative research to improve the safety of Russian-designed nuclear reactors. The two centers started conducting joint research and development projects in January 1997. Since that time the following ten joint projects have been initiated: INSC databases--web server and computing center; Coupled codes--Neutronic and thermal-hydraulic; Severe accident management for Soviet-designed reactors; Transient management and advanced control; Survey of relevant nuclear safety research facilities in the Russian Federation; Computer code validation for transient analysis of VVER and RBMK reactors; Advanced structural analysis; Development of a nuclear safety research and development plan for MINATOM; Properties and applications of heavy liquid metal coolants; and Material properties measurement and assessment. Currently, there is activity in eight of these projects. Details on each of these joint projects are given.

Hill, D. J.; Braun, J. C.; Klickman, A. E.; Bougaenko, S. E.; Kabonov, L. P.; Kraev, A. G.

2000-05-05T23:59:59.000Z

99

Public Use of New Hope Center | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

About Public Use of New Hope ... Public Use of New Hope Center Entrance to New Hope Center New Hope Center, located at 602 Scarboro Road, is Y-12's public interface facility....

100

The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report  

SciTech Connect

The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

S. Bragg-Sitton; J. Bess; J. Werner

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Circuits of power in creating de jure standards: shaping an international information systems security standard  

Science Conference Proceedings (OSTI)

This paper addresses the role of power and politics in setting standards. It examines the interaction of external contingencies, powerful agents, resources, meaning, and membership of relevant social and institutional groupings in generating successful ... Keywords: information systems security management, information systems security standards, institutionalization, power and politics, security management code of practice

James Backhouse; Carol W. Hsu; Leiser Silva

2006-08-01T23:59:59.000Z

102

CFD Simulation and Measurement Validation of Air Distribution at the Hunan International Exhibition Center  

E-Print Network (OSTI)

The Hunan International Exhibition Center (HIEC) is a large space building. A stratified air-conditioning system on the second floor of the building has been adopted. Due to some problems with the air supply jet diffuser, CFD simulations were carried out to predict air distribution. Meanwhile, field measurement results were used to validate the CFD simulation results. A good agreement of simulated and test results was obtained. Based on simulation results, some analyses and suggestions are put forward to improve air distribution.

Deng, T.; Zhang, Q.; Zhang, G.; Yuan, H.

2006-01-01T23:59:59.000Z

103

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

104

Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options  

SciTech Connect

This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of the intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.

Qojas, M.

1999-03-01T23:59:59.000Z

105

Development & expansion of an industrial control system security laboratory and an international research collaboration  

Science Conference Proceedings (OSTI)

In this paper, we describe the incremental building of a unique industrial control system laboratory designed to investigate security vulnerabilities and to support development of mitigating tools and techniques. The laboratory has been built over time ... Keywords: SCADA, critical infrastructure security, industrial control systems, test bed

Rayford B. Vaughn; Thomas Morris; Elena Sitnikova

2013-01-01T23:59:59.000Z

106

Joint nuclear safety research projects between the US and Russian Federation International Nuclear Safety Centers  

SciTech Connect

The Russian Federation Ministry for Atomic Energy (MINATOM) and the US Department of Energy (USDOE) formed international Nuclear Safety Centers in October 1995 and July 1996, respectively, to collaborate on nuclear safety research. Since January 1997, the two centers have initiated the following nine joint research projects: (1) INSC web servers and databases; (2) Material properties measurement and assessment; (3) Coupled codes: Neutronic, thermal-hydraulic, mechanical and other; (4) Severe accident management for Soviet-designed reactors; (5) Transient management and advanced control; (6) Survey of relevant nuclear safety research facilities in the Russian Federation; (8) Advanced structural analysis; and (9) Development of a nuclear safety research and development plan for MINATOM. The joint projects were selected on the basis of recommendations from two groups of experts convened by NEA and from evaluations of safety impact, cost, and deployment potential. The paper summarizes the projects, including the long-term goals, the implementing strategy and some recent accomplishments for each project.

Bougaenko, S.E.; Kraev, A.E. [International Nuclear Safety Center of the Russian MINATOM, Moscow (Russian Federation); Hill, D.L.; Braun, J.C.; Klickman, A.E. [Argonne National Lab., IL (United States). International Nuclear Safety Center

1998-08-01T23:59:59.000Z

107

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

108

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

109

Monsoon Climate Variabilities International Pacific Research Center and Department of Meteorology, School of Ocean and Earth Science and Technology  

E-Print Network (OSTI)

Monsoon Climate Variabilities Tim Li International Pacific Research Center and Department, USA The Asian monsoon consists of three subcomponents, Indian monsoon (IM), East Asian monsoon (EAM), and western North Pacific monsoon (WNPM). All these submonsoon systems exhibit remarkable intraseasonal

Li, Tim

110

Safeguarding a NWS International Enrichment Center as an Enriched Uranium Store  

SciTech Connect

The operational and regulatory singularities of a multilateral facility designed to provide enriched uranium to a consortium of members may engender a new sub-category of safeguard criteria for the International Atomic Energy Agency (IAEA). This paper introduces the contingency of monitoring such a facility as a uranium storage center with cylinders containing low-enriched uranium (LEU) as the principal, and perhaps only, material open to verification. Accountancy and verification techniques will be proffered together with disparate means for maintaining continuity of knowledge (CoK) on verified stock.

Curtis, Michael M.

2008-03-31T23:59:59.000Z

111

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Georgia Technology Information Security Center (GTISC); Idaho State University National Center of Academic Excellence in Information Assurance: ...

112

Assessing and Enhancing the Security of Transmission Assets From International Physical Attack  

Science Conference Proceedings (OSTI)

Potential intentional attacks against electric power systems include sabotage; physical assault; disruption of sensors, information systems, computer networks, and fail-safe systems; tampering with process safety; and indirect attacks such as disruption of water, fuel, or key personnel. While outages from intentional attacks on the physical security of utility assets are rare, such outages can adversely impact the economy, the environment, public safety, and national security. This white paper ...

2013-12-03T23:59:59.000Z

113

Cogeneration of Electricity and Potable Water Using The International Reactor Innovative And Secure (IRIS) Design  

DOE Green Energy (OSTI)

The worldwide demand for potable water has been steadily growing and is projected to accelerate, driven by a continued population growth and industrialization of emerging countries. This growth is reflected in a recent market survey by the World Resources Institute, which shows a doubling in the installed capacity of seawater desalination plants every ten years. The production of desalinated water is energy intensive, requiring approximately 3-6 kWh/m3 of produced desalted water. At current U.S. water use rates, a dedicated 1000 MW power plant for every one million people would be required to meet our water needs with desalted water. Nuclear energy plants are attractive for large scale desalination application. The thermal energy produced in a nuclear plant can provide both electricity and desalted water without the production of greenhouse gases. A particularly attractive option for nuclear desalination is to couple a desalination plant with an advanced, modular, passively safe reactor design. The use of small-to-medium sized nuclear power plants allows for countries with smaller electrical grid needs and infrastructure to add new electrical and water capacity in more appropriate increments and allows countries to consider siting plants at a broader number of distributed locations. To meet these needs, a modified version of the International Reactor Innovative and Secure (IRIS) nuclear power plant design has been developed for the cogeneration of electricity and desalted water. The modular, passively safe features of IRIS make it especially well adapted for this application. Furthermore, several design features of the IRIS reactor will ensure a safe and reliable source of energy and water even for countries with limited nuclear power experience and infrastructure. The IRIS-D design utilizes low-quality steam extracted from the low-pressure turbine to boil seawater in a multi-effect distillation desalination plant. The desalination plant is based on the horizontal tube film evaporation design used successfully with the BN-350 nuclear plant in Aktau, Kazakhstan. Parametric studies have been performed to optimize the balance of plant design. Also, an economic analysis has been performed, which shows that IRIS-D should be able to provide electricity and clean water at highly competitive costs.

Ingersoll, D.T.; Binder, J.L.; Kostin, V.I.; Panov, Y.K.; Polunichev, V.; Ricotti, M.E.; Conti, D.; Alonso, G.

2004-10-06T23:59:59.000Z

114

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

115

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions  

E-Print Network (OSTI)

and implemented. #12;3.06 Folie 6 Some of the challenges for security architectures for Smart Grids · Control to be considered in Smart Grid architectures as well as in the development of future Network infrastructures now information on energy consumption. · Smart meters are essential, but the core functionality of smart grids

Aloul, Fadi

116

Center for Intermodal Transportation Safety  

E-Print Network (OSTI)

Center for Intermodal Transportation Safety and Security Panagiotis Scarlatos, Ph.D., Director Transportation Safety and Security #12;Center for Intermodal Transportation Safety and Security Partners #12 evacuations · Tracking systems for hazardous materials Center for Intermodal Transportation Safety

Fernandez, Eduardo

117

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

118

Experiences and Challenges with Using Cert Data to Analyze International Cyber Security  

E-Print Network (OSTI)

With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The ...

Madnick, Stuart

119

The Center for Frontiers of Subsurface Energy Security (A "Life at the Frontiers of Energy Research" contest entry from the 2011 Energy Frontier Research Centers (EFRCs) Summit and Forum)  

SciTech Connect

'The Center for Frontiers of Subsurface Energy Security (CFSES)' was submitted to the 'Life at the Frontiers of Energy Research' video contest at the 2011 Science for Our Nation's Energy Future: Energy Frontier Research Centers (EFRCs) Summit and Forum. Twenty-six EFRCs created short videos to highlight their mission and their work. CFSES is directed by Gary A. Pope at the University of Texas at Austin and partners with Sandia National Laboratories. The Office of Basic Energy Sciences in the U.S. Department of Energy's Office of Science established the 46 Energy Frontier Research Centers (EFRCs) in 2009. These collaboratively-organized centers conduct fundamental research focused on 'grand challenges' and use-inspired 'basic research needs' recently identified in major strategic planning efforts by the scientific community. The overall purpose is to accelerate scientific progress toward meeting the nation's critical energy challenges.

Pope, Gary A. (Director, Center for Frontiers of Subsurface Energy Security); CFSES Staff

2011-05-01T23:59:59.000Z

120

Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites

About About Careers Community Employees & Retirees Library Suppliers Contact Us Y-12 Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | B&W Y-12 donates $75,000 to Emory Valley Center Facebook Twitter YouTube Flickr RSS Feature Stories Expertise Our NRFTC trainers have many years of operational experience at Y-12 as well as on numerous international missions. Nuclear Detection and Forensics A strong technical nuclear detection and forensics capability is important to the nation's security. "Cook"ing at Y-12 for 70 years We have an enduring mission. Y-12 plays a key role in it. And a nuclear deterrent remains the ultimate insurance policy for America. Young Innovators' Society Awesome Eyeballs visit Y-12

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Turner Construction is looking for interns at our Massachusetts Green High Performance Computing Center (MGHPCC) job site in Holyoke, MA. The ideal candidates would have the following qualifications  

E-Print Network (OSTI)

Turner Construction is looking for interns at our Massachusetts Green High Performance Computing summer positions: May­June, July­August. ABOUT MASSACHUSETTS GREEN HIGH PERFORMANCE COMPUTING CENTER Engineer attdriscoll@tcco.com. Massachusetts Green High Performance Computing Center Intern Positions #12;

Spence, Harlan Ernest

122

The New Orphaned Radioactive Sources Program in the United States International Conference on the Safety of Radiation Sources and the Security of Radioactive  

E-Print Network (OSTI)

1 The New Orphaned Radioactive Sources Program in the United States International Conference on the Safety of Radiation Sources and the Security of Radioactive Materials. September 14-18, 1998 Neil Naraine Exposure of the public to uncontrolled radioactive sources has become an significant concern to the United

123

Why the Gulf War still matters: Foreign perspectives on the war and the future of international security. Report No. 16  

Science Conference Proceedings (OSTI)

This report summarizes the main findings of a Center for National Security Studies (CNSS) project that examined how a number of nations other than the United States have reacted to the course and outcome of the Persian Gulf War of 1991. The project was built around studies of key countries on which the Gulf War might reasonably be expected to have had a significant impact: Argentina, the ASEAN states, Brazil, China, Cuba, Egypt, France, Germany, India, Iran, Iraq, Israel, Italy, Japan, Jordan, Libya, North Korea, Russia, Saudi Arabia, South Korea, Spain, Syria, Taiwan, the United Kingdom, Vietnam, and the states of the former Yugoslavia. These country studies were written by well-recognized independent experts following a common set of guidelines provided by CNSS. When the country studies were completed, they were reviewed and supplemented through a series of peer assessments and workshops. The report represents a synthesis of material generated through this process, and is intended to stimulate thought and further analysis on the critical topics discussed herein.

Garrity, P.J.

1993-07-01T23:59:59.000Z

124

Geopolitics, History, and International Relations  

E-Print Network (OSTI)

of Redundancy Problem: Why More Nuclear Security Forces MayProduce Less Nuclear Security", Risk Analysis 24(4): 935and international security, eco- nomic development, nuclear

Robinson, William I.

2009-01-01T23:59:59.000Z

125

2011 The University of Kansas Medical Center Page 1 Information Resources 9/22/2011 Secure Wireless Windows XP Setup  

E-Print Network (OSTI)

Wireless ­ Windows XP Setup Select the "Start" button and then "Settings" and "Control Panel". On some Resources 9/22/2011 Secure Wireless ­ Windows XP Setup Type kumcsecure in the Network name(SSID): field ­ Windows XP Setup Uncheck the box Select "OK" At this point the wireless configuration has been

Albertini, David

126

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

127

VIDEO: Secretary Moniz on Meeting U.S. Energy Security Policy Challenges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VIDEO: Secretary Moniz on Meeting U.S. Energy Security Policy VIDEO: Secretary Moniz on Meeting U.S. Energy Security Policy Challenges VIDEO: Secretary Moniz on Meeting U.S. Energy Security Policy Challenges October 26, 2013 - 3:35pm Addthis Secretary Moniz speaks at the Center for Strategic and International Studies on October 24, 2013. | Video courtesy of the Center for Strategic and International Studies. Marissa Newhall Marissa Newhall Managing Editor, Energy.gov Learn More About U.S. Energy Security Explore a map that shows the potential effects of climate change on our energy supplies and infrastructure. Learn about recent steps the Energy Department has taken to protect our energy infrastructure from cyber attacks. See ways the Energy Department is working to ensure national security and safety. Read the President's Blueprint for a Secure Energy Future.

128

VIDEO: Secretary Moniz on Meeting U.S. Energy Security Policy Challenges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VIDEO: Secretary Moniz on Meeting U.S. Energy Security Policy VIDEO: Secretary Moniz on Meeting U.S. Energy Security Policy Challenges VIDEO: Secretary Moniz on Meeting U.S. Energy Security Policy Challenges October 26, 2013 - 3:35pm Addthis Secretary Moniz speaks at the Center for Strategic and International Studies on October 24, 2013. | Video courtesy of the Center for Strategic and International Studies. Marissa Newhall Marissa Newhall Managing Editor, Energy.gov Learn More About U.S. Energy Security Explore a map that shows the potential effects of climate change on our energy supplies and infrastructure. Learn about recent steps the Energy Department has taken to protect our energy infrastructure from cyber attacks. See ways the Energy Department is working to ensure national security and safety. Read the President's Blueprint for a Secure Energy Future.

129

November, 2010 J. E. Cherry, International Arctic Research Center and Institute of Northern  

E-Print Network (OSTI)

In MWh. Load Center Hydro Generated Average Generation Capability % of Capability Used Electricity Load operators. The bars show the portion of the electrical load being met by hydropower generation at the Blue is useful for risk management because prediction tools exist for season-ahead forecasting. Longer- term

130

X-ray Security Screening  

Science Conference Proceedings (OSTI)

National and International Standards for X-ray Security Screening Applications. Summary: The primary objective of this ...

2013-03-13T23:59:59.000Z

131

IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847 Cyber-Physical Security Testbeds: Architecture,  

E-Print Network (OSTI)

and secure versions of SCADA protocols. Examples of secure versions are Modbus and Inter- Control Center

Manimaran, Govindarasu

132

CEBAF Center - Cavity Display  

NLE Websites -- All DOE Office Websites (Extended Search)

CEBAF Center - Cavity Display Building Exterior 1st Floor Cafeteria Cavity Display CEBAF Center Auditorium Eating Area UserInternational Liaison Office 2nd Floor Computer Center...

133

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

134

OVERVIEW OF THE COOPERATION BETWEEN THE CHERNOBYL CENTER'S INTERNATIONAL RADIOECOLOGY LABORATORY IN SLAVUTYCH, UKRAINE AND U.S. RESEARCH CENTERS BETWEEN 2000-2010  

SciTech Connect

The International Radioecology Laboratory (IRL) located in Slavutych, Ukraine was created in 1999 under the initiative of the United States Government and the Government of Ukraine in the framework of international cooperation on evaluation and minimization of consequences of the Chernobyl nuclear power plant (ChNPP) accident. Since the time the IRL was founded, it has participated in a large number of projects, including the following: (1) study of radionuclide accumulation, distribution, and migration in components of various ecological systems of the Chernobyl Exclusion Zone (ChEZ); (2) radiation dose assessments; (3) study of the effects of radiation influence on biological systems; (4) expert analysis of isotopic and quantitative composition of radioactive contaminants; (5) development of new methods and technologies intended for radioecological research; (6) evaluation of future developments and pathways for potential remediation of the ChEZ areas; (7) assistance in provision of physical protection systems for ionizing irradiation sources at Ukrainian enterprises; (8) reviews of open Russian language publications on issues associated with consequences of the ChNPP accident, radioactive waste management, radioecological monitoring, and ChNPP decommissioning; (9) conduct of training courses on problems of radioecology, radiation safety, radioecological characterization of test sites and environmental media, and on research methods; (10) conduct of on-site scientific conferences and workshops on the ChEZ and radioecology problems; participation in off-site scientific conferences and meetings; and (11) preparation of scientific and popular science publications, and interactions with mass media representatives. This article provides a brief overview of the major achievements resulting from this cooperation between the IRL and U.S. research centers.

Farfan, E.; Jannik, T.

2011-10-01T23:59:59.000Z

135

2013 DOE Safety and Security Enforcement Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

2013 DOE Safety and Security Workshop 2013 Workshop Home Registration Agendas Hotel and Training Center Information Enforcement Home 2013 DOE Safety and Security Enforcement...

136

Global Security Directorate - Nonproliferation, Safeguards, and...  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Nonproliferation, Safeguards, and Security Programs click for full size image of Megatons to megawatts The Global Security and Nonproliferation Programs...

137

Deployed armor protection: The application of a game theoretic model for security at the los angeles internation airport  

E-Print Network (OSTI)

Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent full security coverage at all times, which allows adversaries to observe and exploit patterns in selective patrolling or monitoring, e.g. they can plan an attack avoiding existing patrols. Hence, randomized patrolling or monitoring is important, but randomization must provide distinct weights to different actions based on their complex costs and benefits. To this end, this paper describes a promising transition of the latest in multi-agent algorithms in fact, an algorithm that represents a culmination of research presented at AAMAS into a deployed application. In particular, it describes a software assistant agent called ARMOR (Assistant for Randomized Monitoring over Routes) that casts this patrolling/monitoring problem as a Bayesian

James Pita; Manish Jain; Janusz Marecki; O Ordez; Christopher Portway; Milind Tambe; Craig Western; Praveen Paruchuri; Sarit Kraus

2008-01-01T23:59:59.000Z

138

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

139

Nuclear and Radiological Material Security | National Nuclear...  

National Nuclear Security Administration (NNSA)

to intensive site security efforts, NNSA is also working to build international standards and criteria for nuclear and radiological security. This includes NNSA's work to...

140

Business Center for Precious Metals  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy Business Center for Precious Metals Department of Energy Business Center for Precious Metals Becky Eddy National Nuclear Security Administration Y-12 Site...

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

142

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

143

Sandia National Laboratories: Research: International Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

international programs acknowledge that global security is a critical component of security at home. Our partnerships help focus international attention, expertise, and...

144

Energy Frontier Research Centers  

NLE Websites -- All DOE Office Websites (Extended Search)

Frontier Research Centers Science for our Nation's Energy Future US Department of Energy Office of Science www.energyfrontier.us 43 ABOVE: CFSES addresses safe, secure and...

145

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

146

Why Use Y-12 TAC? | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training Technology Applications Center Why Use Y-12 TAC? Why Use Y-12 TAC? Security is a substantial component of the Y-12 National Security...

147

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... IEEE MSWiM 2006, 9th Annual International Symposium on Modeling, Analysis and ... "Security and Privacy Issues in Agent-based Location-aware ...

148

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

149

Web Engineering Security: Essential Elements  

E-Print Network (OSTI)

Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

150

Networking and Security Research Center  

E-Print Network (OSTI)

. Schmitter-Edgecombe School of Electrical Engineering and Computer Science, Washington State University, Box a customized sensor network and stored in a SQL database. To provide physical training data for our algorithms using the watering can located in the hallway closet. 4. Playing checkers (cooperative): The participant

Smith, Adam D.

151

Windows Phone 7 Configuration for UR_RC_InternalSecure {Please note that the quality of the screenshots is subject to lack of a screenshot function on Windows Mobile 7 Phone}  

E-Print Network (OSTI)

Windows Phone 7 Configuration for UR_RC_InternalSecure {Please note that the quality of the screenshots is subject to lack of a screenshot function on Windows Mobile 7 Phone} Page 1 of 4 http the Windows logoimprinted button usually on the bottom of the device. Note the arrow in upper right

Portman, Douglas

152

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

153

National Nuclear Security Administration honors Y-12 employees...  

NLE Websites -- All DOE Office Websites (Extended Search)

National Nuclear Security ... National Nuclear Security Administration honors Y-12 employees Posted: September 25, 2012 - 12:55pm Joining Oder (center) to present the awards was...

154

MN Center for Renewable Energy: Cellulosic Ethanol, Optimization of Bio-fuels in Internal Combustion Engines, & Course Development for Technicians in These Areas  

DOE Green Energy (OSTI)

This final report for Grant #DE-FG02-06ER64241, MN Center for Renewable Energy, will address the shared institutional work done by Minnesota State University, Mankato and Minnesota West Community and Technical College during the time period of July 1, 2006 to December 30, 2008. There was a no-cost extension request approved for the purpose of finalizing some of the work. The grant objectives broadly stated were to 1) develop educational curriculum to train technicians in wind and ethanol renewable energy, 2) determine the value of cattails as a biomass crop for production of cellulosic ethanol, and 3) research in Optimization of Bio-Fuels in Internal Combustion Engines. The funding for the MN Center for Renewable Energy was spent on specific projects related to the work of the Center.

John Frey

2009-02-22T23:59:59.000Z

155

Chemical Sciences Division: National Facilities & Centers  

NLE Websites -- All DOE Office Websites (Extended Search)

& CENTERS RESEARCH STUDENT & POSTDOCTORAL OPPORTUNITIES NEWS & EVENTS CSD CONTACTS LBNL HOME Privacy & Security Notice DOE UC Berkeley National Facilities and Centers Chemical...

156

Radiation Emergency Assistance Center / Training Site | National...  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiation Emergency Assistance Center Training Site | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

157

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

158

Energy/National Nuclear Security Administration (NNSA) Career...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EnergyNational Nuclear Security Administration (NNSA) Career Pathways Program EnergyNational Nuclear Security Administration (NNSA) Career Pathways Program Intern Program The...

159

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

160

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Safeguards and Security progress report, January--December 1989  

SciTech Connect

From January to December 1989, the Los Alamos Safeguards and Security Research and Development (R D) program carried out the activities described in the first four parts of this report: Science and Technology Base Development, Basic Systems Design, Onsite Test and Evaluation and Facility Support, and International Safeguards. For the most part, these activities were sponsored by the Department of Energy's Office of Safeguards and Security. Part 1 covers development of the basic technology essential to continuing improvements in the practice of safeguards and security. It includes our computer security R D and the activities of the DOE Center for Computer Security, which provides the basis for encouraging and disseminating this important technology. Part 2 treats activities aimed at developing methods for designing and evaluating safeguards systems, with special emphasis on the integration of the several subsystems into a real safeguards system. Part 3 describes efforts of direct assistance to the DOE and its contractors and includes consultation on materials control and accounting problems, development and demonstration of specialized techniques and instruments, and comprehensive participation in the design and demonstration of advanced safeguards systems. Part 3 also reports a series of training courses in various aspects of safeguards that makes the technology more accessible to those who must apply it. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Part 5 reports several safeguards-related activities that have sponsors other than the DOE/OSS. 87 refs., 52 figs.

Smith, D.B.; Jaramillo, G.R. (comps.)

1990-11-01T23:59:59.000Z

162

Quantum Enabled Security (QES) for Optical Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Los Alamos National Laboratory has developed Quantum Enabled Security (QES), a revolutionary new cybersecurity capability using quantum (single-photon) communications integrated with optical communications to provide a strong, innate, security foundation at the photonic layer for optical fiber networks. July 10, 2013 Quantum Enabled Security (QES) for Optical Communications Available for thumbnail of Feynman Center (505) 665-9090 Email Quantum Enabled Security (QES) for Optical Communications Applications: Secure communication over optical or free space networks Financial networks Transparent access networks: fiber to the home (FTTH); fiber to the

163

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

164

NIST Fundamental Constants Data Center 1999 - FCDC  

Science Conference Proceedings (OSTI)

... FUNDAMENTAL CONSTANTS DATA CENTER. ... The FCDC mission is to: provide an international information center on the fundamental constants; ...

165

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

166

January 2013 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

3 | National Nuclear Security Administration 3 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > January 2013 January 2013 NNSA Blog NNSA employees selected for Nuclear Scholars Initiative program Posted By Office of Public Affairs NNSA Blog The Center for Strategic & International Studies has selected two NNSA employees as part of its 2013 class for the Nuclear Scholars

167

International Aviation Security Technology Symposium  

E-Print Network (OSTI)

terrorist devices and the impracticability of opening and inspecting them all have become highly is given based on these results. Introduction There is a serious concern that terrorists will attempt. The present research is not interested in "maxed-out" containers, since it is unlikely that terrorist devices

Settles, Gary S.

168

The design of a cryptographic security architecture  

Science Conference Proceedings (OSTI)

Traditional security toolkits have concentrated mostly on defining a programming interface (API) and left the internals up to individual implementors. This paper presents a design for a portable, flexible security architecture based on traditional computer ...

Peter Gutmann

1999-08-01T23:59:59.000Z

169

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

170

Annual Planning Summaries: National Nuclear Security Administration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Annual Planning Summary for National Nuclear Security Administration Service Center (NNSA-SC) Annual Planning Summaries briefly describe the status of ongoing NEPA compliance...

171

COLLECTION AND USE OF SOCIAL SECURITY NUMBERS Privacy Policy and Procedure Manual Version: 8-1-12  

E-Print Network (OSTI)

; radiation exposure monitoring 10 CFR 20.1801- 20.1802; PL 109-58, Sec. 652; FAC 64E-5.320 - 5.321; F.S. 404 Imperative Radiation Control & Radiation Services Federal & State security & regulatory requirements Sec. 6109, I.R.C.; UF-1.300 Authorized Study Abroad Services (UF International Center) Florida Prepaid

Slatton, Clint

172

Comparison of Routable Control System Security Approaches  

SciTech Connect

This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

2011-06-01T23:59:59.000Z

173

Next Generation SSH2 Implementation: Securing Data in Motion, 1st edition  

Science Conference Proceedings (OSTI)

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most ... Keywords: Security

Max Caceres; Aaron E. Earle; Devin Ganger; Wipul Jayawickrama; Jan Kanclirz; Dane Liu; Tim Robichaux; Eric S. Seagren; Brad Smith; Christopher Stokes

2008-11-01T23:59:59.000Z

174

No More Secrets: National Security S t r a t e g i e s  

E-Print Network (OSTI)

Macmillan series, Initiatives in Strategic Studies: Issues and Policies. He joined NPS in 1990 after, Contemporary Security Policy, Defense Analysis, Harvard International Review, Homeland Security Affairs, Intelligence and National Security, International Journal of Intelligence and Counterintelligence

Acton, Scott

175

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

176

Enhancing regional security agreements through cooperative monitoring  

SciTech Connect

This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers.

Pregenzer, A.L.

1995-05-01T23:59:59.000Z

177

Dr. Bill Brinkman: Working Towards Greater Energy Security |...  

NLE Websites -- All DOE Office Websites (Extended Search)

Working Towards Greater Energy Security September 7, 2012 Tweet Widget Facebook Like Google Plus One International Innovation, September 2012 International Innovation, September...

178

Safeguards and security status report, August 1981-January 1982  

SciTech Connect

From August 1981 through January 1982, the Los Alamos Safeguards and Security Program was involved in many activities that are described in the four parts of this report: Nuclear Facility Safeguards Support, Security Development and Support, Safeguards Technology Development, and International Support. Part 1 covers those efforts of direct assistance to the Department of Energy and the Nuclear Regulatory Commission licensee facilities. This assistance varies from consultation on materials accounting problems, through development of specialized techniques and devices, to comprehensive participation in the design and implementation of advanced safeguards systems. In addition, a series of training courses in various aspects of safeguards helps make the technology more accessible to those who must apply it. Part 2 concerns a relatively new set of activities at Los Alamos aimed at the security of information and computer systems. The focus this period has been on furthering the development of the Computer Security Center, which provides the basis for encouraging and disseminating the emerging technology. Part 3 describes the development efforts that are essential to continued improvements in the practice of safeguards. Although these projects are properly classified as developmental, in every case they are directed ultimately at recognized problems that commonly occur in operating facilities. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. In addition, enrichment plant safeguards, especially those concerning the Gaseous Centrifuge Enrichment Plant, required a significant portion of our resources. These efforts are beginning to provide substantial returns on our investment in technology transfer.

Shipley, J.P. (comp.)

1982-09-01T23:59:59.000Z

179

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

180

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Cyber Security Testing and Training Programs for Industrial Control Systems  

DOE Green Energy (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

182

Photos | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

183

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Senate Homeland Security and Governmental Affairs Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen

184

National Nuclear Security Administration Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2011 - 1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role: Ensuring our Nation's Security * Maintaining the safety, security and effectiveness of the nuclear weapons stockpile without nuclear testing * Reducing the global danger from the proliferation of nuclear weapons and materials * Provide safe and effective nuclear propulsion for the

185

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services, and International Security Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications Major Management Challenges and Program Risks : Department of Energy GAO/OCG-99-6 GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen Contract Management for Major Projects

186

NNSA Conducts International Radiological Response Training in...  

National Nuclear Security Administration (NNSA)

International Radiological Response Training in Vienna | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

187

Building International Emergency Management Systems | National...  

NLE Websites -- All DOE Office Websites (Extended Search)

Building International Emergency Management Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

188

S t a n f o r d U n i v e r s i t y Center for International Security and Arms Control  

E-Print Network (OSTI)

the responsibility for conducting safeguards inspections under the Non Proliferation Treaty at all nuclear facilities

Ford, James

189

Safeguards and security progress report, January-December 1985  

SciTech Connect

From January to December 1985, the Los Alamos Safeguards and Security Program was involved in the activities described in the first four parts of this report: Safeguards Operations, Security Development and Support, Safeguards Technology Development, and International Support. Part 1 covers efforts of direct assistance to the Department of Energy and Nuclear Regulatory Commission licensee facilities. This assistance includes consultation on materials accounting problems, development and demonstration of specialized techniques and instruments, and comprehensive participation in the design and evaluation of advanced safeguards systems. In addition, a series of training courses in various aspects of safeguards makes the technology more accessible to those who must apply it. Part 2 treats activities aimed at the security of information and computer systems. Our focus this period was on continuing the activities of the Center for Computer Security, which provides the basis for encouraging and disseminating this emerging technology, and on the development and demonstration of secure computer systems. Part 3 describes the broad development efforts essential to continuing improvements in the practice of safeguards. Although these projects are properly classified as developmental, they address recognized problems that commonly occur in operating facilities. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Enrichment plant safeguards and international safeguards for reprocessing plants required a significant portion of our resources. All of these efforts are beginning to provide substantial returns on our investment in technology transfer, not only in raising the level of safeguards effectiveness but also in our benefiting from field experiences in operating environments.

1987-03-01T23:59:59.000Z

190

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

191

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

192

NNSA Announces Selection of Centers of Excellence for Academic...  

NLE Websites -- All DOE Office Websites (Extended Search)

Announces Selection of Centers of Excellence for Academic Computational Science Partnerships | National Nuclear Security Administration Our Mission Managing the Stockpile...

193

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

194

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

195

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

196

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

197

Argonne's National Security Information Systems National  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

198

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Reports Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO),

199

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

200

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

202

Center for Emergent Superconductivity 2013 Fall Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

main gate, please inform the guard you are attending the Center for Emergent Superconductivity 2013 Fall Workshop workshop. You may be requested to check in at the security...

203

Center for Geospatial Analysis [EVS Program Area  

NLE Websites -- All DOE Office Websites (Extended Search)

Resources Ecological Resources and Systems Radiation and Chemical Risk Management Environmental Security and Restoration Atmospheric Science and Climate Research Center for...

204

US, International Partners Remove Last Remaining HEU from Vietnam...  

National Nuclear Security Administration (NNSA)

International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone | National Nuclear Security Administration Our Mission Managing the Stockpile...

205

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

206

NREL: International Activities - Multilateral Partnerships  

NLE Websites -- All DOE Office Websites (Extended Search)

21st Century Power Partnership, the Clean Energy Solutions Center, and the International Smart Grid Action Network. Clean Energy Solutions Center NREL operates the Clean Energy...

207

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

208

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

209

Security Assessment Simulation Toolkit (SAST) Final Report  

Science Conference Proceedings (OSTI)

The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

2009-11-15T23:59:59.000Z

210

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

211

Safeguards and security progress report, January-December 1983  

SciTech Connect

From January to December 1983, the Los Alamos Safeguards and Security Program was involved in the activities described in the first four parts of this report: Nuclear Facility Support, Security Development and Support, Safeguards Technology Development, and International Safeguards. Part 1 covers efforts of direct assistance to the Department of Energy (DOE) and Nuclear Regulatory Commission (NRC) licensee facilities. This assistance includes consultation on materials accounting problems, development of specialized techniques and instruments, and comprehensive participation in the design and implementation of advanced safeguards systems. In addition, a series of training courses in various aspects of safeguards makes the technology more accessible to those who must apply it. Part 2 treats activities aimed at the security of information and computer systems. Our focus this peiod was on continuing the activities of the Computer Security Center, which provides the basis for encouraging and disseminating this emerging technology, and on the development and demonstration of secure computer systems. Part 3 describes the broad development efforts essential to continuing improvements in the practice of safeguards. Although these projects are properly classified as developmental, they address recognized problems that commonly occur in operating facilities. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Enrichment plant safeguards, especially those concerning the Gas Centrifuge Enrichment Plant, required a significant portion of our resources. These efforts are beginning to provide substantial returns on our investment in technology transfer, not only in raising the level of safeguards effectiveness but also in our benefiting from field experiences in operating environments.

Smith, D.B. (comp.)

1984-09-01T23:59:59.000Z

212

NIST Fundamental Constants Data Center - Tech. Act. 2000  

Science Conference Proceedings (OSTI)

... Fundamental Constants Data Center. ... Mission. The FCDC mission is to: provide an international information center on the fundamental constants; ...

213

Office of Security Training Operations - Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Training Operations Please click on this link to go to the National Training Center. Mission The mission of the Office of Security Training Operations is to develop and...

214

Report of a workshop on nuclear power growth and nonproliferation held at the Woodrow Wilson international center for scholars, Washington, DC, April 21, 2010  

SciTech Connect

The workshop addressed the future of nuclear power and nonproliferation in light of global nuclear energy developments, changing US policy and growing concerns about nuclear proliferation and terrorism. The discussion reflected wide agreement on the need for nuclear power, the necessity of mitigating any proliferation and terrorism risks and support for international cooperation on solutions. There were considerable differences on the nature and extent of the risks of differing fuel cycle choices. There was some skepticism about the prospects for a global nuclear energy renaissance, but there was a recognition that nuclear power would expand somewhat in the decades ahead with some states expanding capacity dramatically (e.g., China) and at least a few new states developing nuclear power programs. It was also argued by some participants that under the right conditions, a genuine renaissance could occur some decades from now. The prospects for a dramatic growth in nuclear power will depend on the ability of governments and industry to address these concerns, including the effectiveness of, and the resources devoted to, plans to develop and implement technologies and approaches that strengthen nonproliferation, nuclear materials accountability and nuclear security Several participants noted that the United States will not be able to continue to lead global nonproliferation efforts and to shape the growth of nuclear power as well as the global environment and energy debates without a robust US nuclear energy program. Some participants argued that fully integrating nuclear energy growth and nonproliferation, proliferation resistance and physical protection objectives was possible. The growing consensus on these objectives and the growing concern about the potential impact of further proliferation on the industry was one reason for optimism. The Blue Ribbon commission led by Scowcroft and Hamilton was seen as going far beyond the need to find an alternative to Yucca Mountain, and the preeminent forum in the next years to address the back end of the fuel cycle and other issues. Some argued that addressing these issues is the critical missing element, or the final piece of the puzzle to ensure the benefits of nuclear power and to promote nonproliferation. In this context, many argued that R&D on closed as well as open fuel cycle options in order to ensure a suite of long-term options was essential.

Pilat, Joseph F [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

215

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

216

LANSCE | Lujan Neutron Scattering Center  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy, National Office of Science Department of Energy, National Office of Science science.energy.gov Department of Energy, National Nuclear Security Administration nnsa.energy.gov Lujan Neutron Scattering Center Logo Lujan Center Mission The Lujan Center delivers science by exploiting the unique characteristics of intense beams of pulsed neutrons for academia, national security, and industry. Lujan Center Vision The Lujan Center will operate a world class user program in the service of the nation. Lujan Center scientists will be recognized for their leadership and innovation in neutron scattering. Lujan Center at LANSCE The Lujan Center is one of five user facilities supported by the LANSCE accelerator which is stewarded. Funding to operate 10 instruments in a national user program is provided by the Department of Energy's Office of

217

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

218

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

219

Energy Security: An Interdisciplinary Approach, 2nd edition  

Science Conference Proceedings (OSTI)

Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing international competition over fossil fuel deposits. Energy Security: An Interdisciplinary Approach gives A comparative ...

Gawdat Bahgat

2011-05-01T23:59:59.000Z

220

Meeting Federal Energy Security Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Markel Markel SRA International Lawrence_Markel@sra.com Federal Utility Partnership Working Group Fall 2012 - October 16-17 Mobile, AL Sponsored by Alabama Power Theme Meeting energy security requirements in federal facilities provides opportunities for additional types of cooperation between utilities and the federal agencies. However, there are significant barriers to pursuing these opportunities - constraints on utilities and on federal agencies, as well as sometimes-competing objectives. Energy security encompasses sufficiency, surety, and sustainability.  Above all, energy security means having adequate power to conduct critical operations for the duration required (sufficiency).  Secondarily, and leading to sufficiency, is ensuring resilient energy supplies that are accessible when

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

German Agency for International Cooperation (GIZ) Feed | Open Energy  

Open Energy Info (EERE)

Cooperation (GIZ) Feed Cooperation (GIZ) Feed Jump to: navigation, search Home | About | Inventory | Partnerships | Capacity Building | Webinars | Reports | Events | News | List Serve CLEAN Member Feeds Center for Environment and National Security at Scripps Centro de Energías Renovables (CER) The Children's Investment Fund Foundation (CIFF) Climate and Development Knowledge Network (CDKN) Climate Technology Initiative (CTI) ClimateWorks Foundation Coalition for Rainforest Nations (CfRN) Ecofys Energy Research Centre of the Netherlands (ECN) Energy Sector Management Assistance Program of the World Bank (ESMAP) Environment and Development Action in the Third World (ENDA-TM) German Aerospace Center (DLR) German Agency for International Cooperation (GIZ) Global Village Energy Partnership (GVEP)

222

Internal Audit Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Internal Audit Services Internal Audit Services Berkeley Lab Internal Audit Services Internal Audit Services Berkeley Lab Contacts Organizational Chart IAS Search Staff Only Lab Search Phone Book A-Z Index Privacy and Security Notice "Internal Auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization's operations. It helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control and governance processes." The Institute of Internal Auditors Standards for the Professional Practice of Internal Auditing About IAS | Audit Committee | Audit Planning | Ethics & Investigations | External Audit Coordination Advisory Services | Other Relevant Audit Links | Contacts | Organizational

223

Office of Cyber Security Evaluations Appraisal Process Guide...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IARC Information Assurance Resource Center IG Office of the Inspector General IP Internet Protocol ISSM Integrated Safeguards and Security Management NNSA National Nuclear...

224

2010 Annual Planning Summary for National Nuclear Security Administrat...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Annual Planning Summary for National Nuclear Security Administration Service Center (NNSA-SC) Annual Planning Summaries briefly describe the status of ongoing NEPA compliance...

225

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

226

National Security Studies Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Security Studies Program National Security Studies Program National Security Studies Program Objective The National Security Studies Program (NSSP) is designed to prepare future leaders of civilian agencies for high-level policy, command, and staff responsibilities. The NSSP focuses on international environments and commercial partnerships. All students successfully completing the program are awarded a Master's degree. The program does not involve a promotion or a change in position. Benefits to the Organization The program prepares federal civilian employees for high-level policy, command, and staff responsibilities. Participants will gain valuable experience in leadership, information strategy, national security studies, military strategy, logistics, economics, industry studies, and more. The

227

DOE Information Center  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE Information Center DOE Information Center The U.S. Department of Energy (DOE) Information Center provides citizens a consolidated facility to obtain information and records related to the DOE's various programs in Oak Ridge and abroad. Employees at the DOE Information Center are available to assist with your requests and searches from 8:00 a.m. to 5:00 p.m. (EST), Monday through Friday, except for federal holidays. Requests Documents can be requested in person or by telephone, email, or fax. Reproduction Please allow DOE Information Center staff adequate time to reproduce documents. Some material requires special handling, security reviews, etc. Delivery Unless special arrangements have been made with DOE Information Center staff, documents should be picked up during normal business hours.

228

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

229

The Problem of Redundancy Problem: Why More Nuclear Security Forces May Produce Less Nuclear Security. Risk Analysis 24  

E-Print Network (OSTI)

on the World Trade Center and the Pentagon, many scholars, journalists, and public officials expressed fear about the security of nuclear facilities in the

Scott D. Sagan

2004-01-01T23:59:59.000Z

230

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security  

Science Conference Proceedings (OSTI)

SCADA (Supervisory Control and Data Acquisition), these are systems based on real-time processing, control and design for real time infrastructure such as water pumping stations, oil purification plants and rail control centers etc. In the initial structure ... Keywords: SCADA attacks, cryptography hybrid algorithm, data flow and distribution, distributed network protocole, hybrid algorithms, prevention system, secure simulation model, security issues, security services, simulation base experimentation and results, supervisory control and data acquisition (SCADA)

Shahrulniza Musa; AAmir Shahzad; Abdulaziz Aborujilah

2013-01-01T23:59:59.000Z

231

Briefings on Physical Security of Electricity Substations  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

232

Center Scientists Assist Mexico  

NLE Websites -- All DOE Office Websites (Extended Search)

Center Scientists Assist Mexico The U.S. Agency for International Development (USAID) has approved funds for LBL to provide technical assistance to Mexico's Comisi-n Nacional de...

233

Independent Activity Report, Nevada National Security Site - December 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 2012 Independent Activity Report, Nevada National Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit [HIAR NNSS-2012-12-03] The purpose of this Office of Health, Safety and Security (HSS) activity was to perform an operational awareness site visit to observe Subcritical Experiment (SCE) activities at the U1a Complex, discuss ongoing activities at the National Criticality Experiment Research Center (NCERC), and monitor the status of other ongoing site activities at the Nevada National Security Site (NNSS) operated by National Security Technologies, LLC (NSTec). Independent Activity Report, Nevada National Security Site - December 2012 More Documents & Publications Independent Activity Report, Nevada National Security Site - August 2012

234

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

235

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

236

Security, Safety and Health  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, Fourth Quarter, 2012 8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest Government Honor in Science & Engineering This September marked a major mile- stone for one of the Office of Fossil Energy's largest carbon capture, utili- zation and storage projects: the opening

237

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

238

Understanding Lustre Internals  

SciTech Connect

Lustre was initiated and funded, almost a decade ago, by the U.S. Department of Energy (DoE) Office of Science and National Nuclear Security Administration laboratories to address the need for an open source, highly-scalable, high-performance parallel filesystem on by then present and future supercomputing platforms. Throughout the last decade, it was deployed over numerous medium-to-large-scale supercomputing platforms and clusters, and it performed and met the expectations of the Lustre user community. As it stands at the time of writing this document, according to the Top500 list, 15 of the top 30 supercomputers in the world use Lustre filesystem. This report aims to present a streamlined overview on how Lustre works internally at reasonable details including relevant data structures, APIs, protocols and algorithms involved for Lustre version 1.6 source code base. More importantly, it tries to explain how various components interconnect with each other and function as a system. Portions of this report are based on discussions with Oak Ridge National Laboratory Lustre Center of Excellence team members and portions of it are based on our own understanding of how the code works. We, as the authors team bare all responsibilities for all errors and omissions in this document. We can only hope it helps current and future Lustre users and Lustre code developers as much as it helped us understanding the Lustre source code and its internal workings.

Wang, Feiyi [ORNL; Oral, H Sarp [ORNL; Shipman, Galen M [ORNL; Drokin, Oleg [ORNL; Wang, Di [ORNL; Huang, He [ORNL

2009-04-01T23:59:59.000Z

239

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

240

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

242

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

243

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

244

Security of Bhutan: Walking Between the Giants  

E-Print Network (OSTI)

-strategic location makes Bhutan so important in big neighbours perception of security. Bhutan has never been colonized and as a result Bhutanese society has traditionally been sensitive to the issues of security, and preserving its sovereignty, independence... in regional and international meetings on security, hydropower development, tourism and health. Bhutan has always maintained one-China policy by voting for restoring China's United Nations seat in 1971, and as 55th UN General Assemblys Vice...

Penjore, Dorji

2004-01-01T23:59:59.000Z

245

NNSA interns visit Sandia National Laboratories | National Nuclear...  

National Nuclear Security Administration (NNSA)

interns visit Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

246

The Office of Nuclear Verification | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

at NNSA Blog The Office of Nuclear Verification Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Verification...

247

Nuclear Material Recovery | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Recovery Securing nuclear material domestically and internationally is one part of Y-12's nuclear nonproliferation business. Miscellaneous scrap material is a diverse group of...

248

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

249

April 2011 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

250

Seeding Innovation (2009) | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

251

NPT Signed | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

252

Impact Velocity (2011) | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

253

DOE Turns 25 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

254

Cuban Missile Crisis | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

255

June 2010 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

256

August 2010 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

257

NNSA Streamlines Operations | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

258

START Signed | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

259

Program Documents | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

260

July 2010 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

A security-centric ring-based software architecture  

Science Conference Proceedings (OSTI)

Software architectures that are centered on security historically contain layers to implement security controls, with the layered structure tending towards a series of rings. John Warden devised a five-ring model to assess enemy systems for strategic ... Keywords: Warden's five-ring model, computer security, software architecture

Jay-Evan J. Tevis; John A. Hamilton, Jr.

2007-03-01T23:59:59.000Z

262

Emerging trends around big data analytics and security: panel  

Science Conference Proceedings (OSTI)

This panel will discuss the interplay between key emerging security trends centered around big data analytics and security. With the explosion of big data and advent of cloud computing, data analytics has not only become prevalent but also a critical ... Keywords: analytics, big data, privacy, security

Rafae Bhatti; Ryan LaSalle; Rob Bird; Tim Grance; Elisa Bertino

2012-06-01T23:59:59.000Z

263

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

264

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

265

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

266

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

267

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

268

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

269

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

270

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

271

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

272

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

273

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

274

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

275

The Sub-bureau for Atmospheric Angular Momentum of the International Earth Rotation Service: A Meteorological Data Center with Geodetic Applications  

Science Conference Proceedings (OSTI)

By exchanging angular momentum with the solid portion of the earth, the atmosphere plays a vital role in exciting small but measurable changes in the rotation of our planet. Recognizing this relationship, the International Earth Rotation Service ...

David A. Salstein; Richard D. Rosen; Deirdre M. Kann; Alvin J. Miller

1993-01-01T23:59:59.000Z

276

Oncology Center  

SciTech Connect

Efforts by the Hollings Cancer Center to earn a designation as a National Cancer Center are outlined.

Kraft, Andrew S.

2009-09-21T23:59:59.000Z

277

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

278

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

279

Alternative Fuels Data Center  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Hydrogen » Laws & Incentives Hydrogen » Laws & Incentives Printable Version Share this resource Send a link to Alternative Fuels Data Center to someone by E-mail Share Alternative Fuels Data Center on Facebook Tweet about Alternative Fuels Data Center on Twitter Bookmark Alternative Fuels Data Center on Google Bookmark Alternative Fuels Data Center on Delicious Rank Alternative Fuels Data Center on Digg Find More places to share Alternative Fuels Data Center on AddThis.com... More in this section... Hydrogen Basics Benefits & Considerations Stations Vehicles Laws & Incentives Federal Laws and Incentives for Hydrogen Fuel Cells The list below contains summaries of all Federal laws and incentives related to Hydrogen Fuel Cells. Incentives Alternative Fuel Tax Exemption Alternative fuels used in a manner that the Internal Revenue Service (IRS)

280

International Energy Agency Feed | Open Energy Information  

Open Energy Info (EERE)

Feed Feed Jump to: navigation, search Home | About | Inventory | Partnerships | Capacity Building | Webinars | Reports | Events | News | List Serve CLEAN Member Feeds Center for Environment and National Security at Scripps Centro de Energías Renovables (CER) The Children's Investment Fund Foundation (CIFF) Climate and Development Knowledge Network (CDKN) Climate Technology Initiative (CTI) ClimateWorks Foundation Coalition for Rainforest Nations (CfRN) Ecofys Energy Research Centre of the Netherlands (ECN) Energy Sector Management Assistance Program of the World Bank (ESMAP) Environment and Development Action in the Third World (ENDA-TM) German Aerospace Center (DLR) German Agency for International Cooperation (GIZ) Global Village Energy Partnership (GVEP) Information for Development Program (infoDev)

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

International Workshop on Nuclear Forensics Strengthens Global...  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > International Workshop on Nuclear Forensics Strengthens Global Security...

282

"Renewable Energy Transition and International Climate Cooperation  

E-Print Network (OSTI)

"Renewable Energy Transition and International Climate Cooperation: The German Experience" Jürgen at Urbana-Champaign. His research and teaching interests include: energy security, climate change

Sheridan, Jennifer

283

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

284

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

285

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

286

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

287

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

288

Independent Activity Report, Nevada National Security Site - August 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August August 2012 Independent Activity Report, Nevada National Security Site - August 2012 August 2012 Operational Awareness Oversight of the Nevada National Security Site [HIAR NNSS-2012-08-16] The purpose of this Office of Health, Safety and Security (HSS) activity was to perform an operational awareness site visit to observe Subcritical Experiment (SCE) activities at the U1a Complex, discuss ongoing activities at the Device Assembly Facility (DAF) and the National Criticality Experiment Research Center (NCERC), and monitor the status of other ongoing site activities at the Nevada National Security Site (NNSS) operated by National Security Technologies, LLC (NSTec). Independent Activity Report, Nevada National Security Site - August 2012 More Documents & Publications

289

Asian Energy Security  

Science Conference Proceedings (OSTI)

OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of regional coordination on energy issues in Northeast Asia. The paragraphs below summarize Nautilus' plans for the AES project in the coming months.

Peter Hayes, PhD

2003-12-01T23:59:59.000Z

290

Professor and Director of the Fusion Science Center of Extreme...  

NLE Websites -- All DOE Office Websites (Extended Search)

Professor and Director of the Fusion Science Center of Extreme States of Matter and Fast Ignition, University of Rochester | National Nuclear Security Administration Our Mission...

291

Office of the National Training Center - Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

National Training Center Home Sub Offices Security Training Operations Safety Training Operations Related Links DOE DOE CIO NNSA DOE CFO NTC DHS ...

292

Materials for Nuclear Power: Digital Resource Center Text Topic  

Science Conference Proceedings (OSTI)

Print this topic. Topic Title WEB RESOURCE: Nuclear Energy and Global Security Technologies Center. Date Posted: 5/15/2007 2:43 PM Posted By: Lynne...

293

2011 Annual Planning Summary for NNSA Service Center (NNSASC...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Annual Planning Summary for National Nuclear Security Administration Service Center (NNSA-SC) 2011 Annual Planning Summary for NNSA, Infrastructure and Environment (NA-50) 2011...

294

Materials for Nuclear Power: Digital Resource Center - WEB ...  

Science Conference Proceedings (OSTI)

May 15, 2007 ... Access to forms and file codes is also provided. Citation: "Online Documents." Nuclear Energy and Global Security Technologies Center 2007.

295

Lempke receives Sandia Emergency Operations Center tour | National...  

NLE Websites -- All DOE Office Websites (Extended Search)

receives Sandia Emergency Operations Center tour | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

296

Nuclear and Radiological Field Training Center | Y-12 National...  

NLE Websites -- All DOE Office Websites (Extended Search)

Field Training Center A site used for nuclear research in Oak Ridge, Tennessee during the Manhattan Project is now the Y-12 National Security Complex's Nuclear and Radiological...

297

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Science Conference Proceedings (OSTI)

Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratorys (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

298

Security in the Middle East  

Science Conference Proceedings (OSTI)

The full range of U.S. security interests in the Middle East is covered in this volume of original contributions from prominent international scholars. Case studies of key countries emphasize the prospects for peaceful political, economic, and cultural change in the region. The Arab-Israeli conflict is examined with particular attention to the ''Palestine problem,'' U.S. policy and diplomacy, and the peace process. Finally, the involvement of the U.S. and the USSR and the policy options open to them are considered. Includes chapters on oil and its role in Middle-East security issues.

Wells, S.F. Jr.; Bruzonsky, M.A.

1986-01-01T23:59:59.000Z

299

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

300

The 11th International Topical Meeting on Nuclear Thermal-Hydraulics (NURETH-11) Popes' Palace Conference Center, Avignon, France, October 2-6, 2005  

E-Print Network (OSTI)

in the simulation of the coolant flow in a nuclear reactor. In order to better understand their role in the genericThe 11th International Topical Meeting on Nuclear Thermal-Hydraulics (NURETH-11) Popes' Palace. This is the case, for instance, for the modelling of the coolant flow in a Pressurized Water Reactor. In the frame

Chalons, Christophe

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

COMPUTATIONAL SCIENCE CENTER  

SciTech Connect

The Brookhaven Computational Science Center brings together researchers in biology, chemistry, physics, and medicine with applied mathematicians and computer scientists to exploit the remarkable opportunities for scientific discovery which have been enabled by modern computers. These opportunities are especially great in computational biology and nanoscience, but extend throughout science and technology and include for example, nuclear and high energy physics, astrophysics, materials and chemical science, sustainable energy, environment, and homeland security.

DAVENPORT,J.

2004-11-01T23:59:59.000Z

302

National Security Technology Incubator Business Plan  

SciTech Connect

This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

2007-12-31T23:59:59.000Z

303

Safeguards and security research and development: Progress report, October 1994--September 1995  

Science Conference Proceedings (OSTI)

The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.

Rutherford, D.R.; Henriksen, P.W. [comp.

1997-03-01T23:59:59.000Z

304

A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications  

Science Conference Proceedings (OSTI)

International standard bodies such as the Parlay Group, 3GPP (Third Generation Partnership Project), and ETSI TISPAN describe an applications middleware in the form of open service access (OSA)/Parlay Application Programming Interfaces and Parlay X Web ... Keywords: Digital signature and encryption, Intrusion detection and prevention (IDP) system, Middleware vulnerabilities and security threats, SQL Injection attacks, Security assertion markup language (SAML)

Muhammad Sher; Thomas Magedanz

2007-11-01T23:59:59.000Z

305

Mitigations for Security Vulnerabilities Found in Control System Networks |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mitigations for Security Vulnerabilities Found in Control System Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in

306

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

307

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

308

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

309

Cooperative monitoring of regional security agreements  

SciTech Connect

This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

1996-11-01T23:59:59.000Z

310

Information sharing and security in dynamic coalitions  

Science Conference Proceedings (OSTI)

Today, information sharing is critical to almost every institution. There is no more critical need for information sharing than during an international crisis, when international coalitions dynamically form. In the event of a crisis, whether it is humanitarian ... Keywords: access control, distributed systems, dynamic coalitions, information security

Charles E. Phillips, Jr.; T.C. Ting; Steven A. Demurjian

2002-06-01T23:59:59.000Z

311

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

312

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

313

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

314

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

315

Internal Dosimetry  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MEASUREMENT MEASUREMENT SENSITIVE DOE-STD-1121-2008 Change Notice No.1 October 2013 DOE STANDARD INTERNAL DOSIMETRY U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document is available on the Department of Energy Technical Standards Program Web Site at http://energy.gov/hss/information-center/department-energy- technical-standards-program ii Change Notice 1. Internal Dosimetry DOE-STD-1121-2008 Page/Section Change Throughout Change: airborne contamination To: airborne radioactivity Section 1.5, p. 4 Change: HPS N 13.1-1999 To: HPS N 13.1-2011 Section 1.5, p. 4 Change: HPS N 13.6-1999 To: HPS N 13,.6-2010 Section 1.5, p. 4 Delete: HPS N 13.14-1994, Internal Dosimetry Programs for

316

Materials Reliability Program: Second International Conference on Fatigue of Reactor Components (MRP-84): July 29-August 1, 2002; Sn owbird Ski and Conference Center, Snowbird, Utah  

Science Conference Proceedings (OSTI)

This proceedings contains information presented at the Second International Conference on Fatigue of Reactor Components held 31 July - 1 August, 2002 in Snowbird, Utah. This second conference, again sponsored by EPRI, the Organisation for Economic Co-operation and Development (OECD), the Nuclear Energy Agency/Committee on the Safety of Nuclear Installations (NEA/CSNI), and the U.S. Nuclear Regulatory Commission (NRC), provided a forum for the technical discussion of fatigue issues that affect the integri...

2003-03-04T23:59:59.000Z

317

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

318

College of Health, Safety & Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Health, Safety & Security Health, Safety & Security College of Health, Safety & Security College of Health, Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS) performs the mission-critical support function of developing, maintaining, and delivering standardized safety, safeguards, security, and protective force training for DOE and NNSA Federal and contractor employees. The NTC is a direct report organizational element of HSS. NTC courses are designed for DOE Federal and contractor personnel who have job responsibilities in the areas of safeguards, security, and safety. There is no cost to Federal and contractor personnel who qualify to attend the training. Registration Contact the National Training Center Registration Office:

319

Security Council Approval of Kofi  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 9 Week Ending Friday, December 20, 1996 Statement on the United Nations Security Council Approval of Kofi Annan as Secretary-General December 13, 1996 I'm delighted by today's vote in the United Nations Security Council, selecting Kofi Annan of Ghana to be the new U.N. Sec- retary-General. We are hopeful that the Gen- eral Assembly will concur with the Security Council early next week. Through his decades of work at the United Nations and in the international arena, Kofi Annan has established excellent working re- lations with many countries, including the United States. Over the last 4 years as U.N. Undersecretary for Peacekeeping, and throughout his impressive career, he has proven himself an able and energetic man- ager-professional, impartial, well-versed in

320

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

322

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

323

German Aerospace Center (DLR)Feed | Open Energy Information  

Open Energy Info (EERE)

Feed Feed Jump to: navigation, search Home | About | Inventory | Partnerships | Capacity Building | Webinars | Reports | Events | News | List Serve CLEAN Member Feeds Center for Environment and National Security at Scripps Centro de Energías Renovables (CER) The Children's Investment Fund Foundation (CIFF) Climate and Development Knowledge Network (CDKN) Climate Technology Initiative (CTI) ClimateWorks Foundation Coalition for Rainforest Nations (CfRN) Ecofys Energy Research Centre of the Netherlands (ECN) Energy Sector Management Assistance Program of the World Bank (ESMAP) Environment and Development Action in the Third World (ENDA-TM) German Aerospace Center (DLR) German Agency for International Cooperation (GIZ) Global Village Energy Partnership (GVEP) Information for Development Program (infoDev)

324

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

325

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

326

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

327

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

328

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

329

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

330

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

331

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

332

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

333

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

334

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

335

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

336

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

337

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

338

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

339

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

340

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

342

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

343

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

344

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

345

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

346

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

347

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

348

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

349

Security-by-design handbook.  

SciTech Connect

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

350

SELF-CENTERING POSITIVE LOCKING GRAPNEL  

DOE Patents (OSTI)

A grapnel used for remotely securing a load to be hoisted is described. The grapnel of the invention is generally conical in shape with a plurality of semi-open bores laterally disposed about the device. The bores meet at the apex of the grapnel and there provde a securing pocket for a spherical member. A load provided with a rigid support rod having a spherical member at its end can be secured by directing the spherical member down one of the bores and into the securing pocket. The major advantsges of the invention reside in the self- centering and positive locking features.

Hopper, C.G.

1961-07-01T23:59:59.000Z

351

Resources : BioEnergy Science Center  

NLE Websites -- All DOE Office Websites (Extended Search)

Resources Publications BESC Knowledgebase Biofacts BESC BioEnergy Science Center Fact Sheets BESC Press Releases Videos Audio e-Magazine Images Our Research BESC Wiki (internal...

352

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

353

Value Centers  

Science Conference Proceedings (OSTI)

Value centers identify the over-reaching themes, initiatives, and opportunities in alignment with the strategic goals of AOCS. Value Centers AOCS History and Governance about us aocs committees contact us division council fats governing board hist

354

Abramovo Counterterrorism Training Center  

Science Conference Proceedings (OSTI)

The U.S. government has been assisting the Russian Federation (RF) Ministry of Defense (MOD) for many years with nuclear weapons transportation security (NWTS) through the provision of specialized guard escort railcars and cargo railcars with integrated physical security and communication systems, armored transport vehicles, and armored escort vehicles. As a natural continuation of the NWTS program, a partnership has been formed to construct a training center that will provide counterterrorism training to personnel in all branches of the RF MOD. The Abramovo Counterterrorism Training Center (ACTC) is a multinational, multiagency project with funding from Canada, RF and the U.S. Departments of Defense and Energy. ACTC will be a facility where MOD personnel can conduct basic through advanced training in various security measures to protect Category IA material against the threat of terrorist attack. The training will enhance defense-in-depth principles by integrating MOD guard force personnel into the overall physical protection systems and improving their overall response time and neutralization capabilities. The ACTC project includes infrastructure improvements, renovation of existing buildings, construction of new buildings, construction of new training facilities, and provision of training and other equipment. Classroom training will be conducted in a renovated training building. Basic and intermediate training will be conducted on three different security training areas where various obstacles and static training devices will be constructed. The central element of ACTC, where advanced training will be held, is the 'autodrome,' a 3 km road along which various terrorist events can be staged to challenge MOD personnel in realistic and dynamic nuclear weapons transportation scenarios. This paper will address the ACTC project elements and the vision for training development and integrating this training into actual nuclear weapons transportation operations.

Hayes, Christopher M [ORNL; Ross, Larry [U.S. Department of Energy; Lingenfelter, Forrest E [ORNL; Sokolnikov, Pavel I [ORNL; Kaldenbach, Karen Yvonne [ORNL; Estigneev, Yuri [Eleron; Murievav, Andrey [Eleron

2011-01-01T23:59:59.000Z

355

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

356

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

357

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

358

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS NEW YORK, NY  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

359

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS BOSTON, MA  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

360

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS DENVER, CO  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS HOUSTON, TX  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

362

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS TAMPA, FL  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

363

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS CHICAGO, IL  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

364

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands, and the cyber security of substations in particular. The focus of this study is the perception of risks and threats in smart grid cyber security and the international standards implemented in smart grids. The created overview is based on semi-structured interviews with 13 experts originating from eight different European countries. These participants are employed at electricity producers, grid operators, technology consultants and technology providers in the utilities sector. Their expertise ranges from information security to electricity grids, specifically smart grid security. Some of them are members of smart grid security related standard committees. The key results of the state of practice are the following: 1. The interconnectivity of the smart grid with multiple stakeholders and European colleagues is indicated as the biggest threat to the security of the smart grid. 2. Another often mentioned threat is awareness. The experts generally indicate that awareness within top management is high. However, personnel on lower levels are reluctant to incorporate security in their processes. 3. All organizations are in a certain stage of implementing standards, the ISO27000 series

Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper; Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper

2012-01-01T23:59:59.000Z

365

Security challenges and opportunities in adaptive and reconfigurable hardware  

E-Print Network (OSTI)

We present a novel approach to building hardware support for providing strong security guarantees for computations running in the cloud (shared hardware in massive data centers), while maintaining the high performance and ...

Costan, Victor Marius

366

NREL: Vehicles and Fuels Research - Secure Transportation Data...  

NLE Websites -- All DOE Office Websites (Extended Search)

NREL is addressing the data-privacy issue by providing the Transportation Secure Data Center (TSDC) to house this rich data for continued and expanded research. The TSDC will...

367

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

368

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

369

Cooperative monitoring of regional security agreements  

SciTech Connect

This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

1995-08-01T23:59:59.000Z

370

COMPUTATIONAL SCIENCE CENTER  

SciTech Connect

The Brookhaven Computational Science Center brings together researchers in biology, chemistry, physics, and medicine with applied mathematicians and computer scientists to exploit the remarkable opportunities for scientific discovery which have been enabled by modern computers. These opportunities are especially great in computational biology and nanoscience, but extend throughout science and technology and include, for example, nuclear and high energy physics, astrophysics, materials and chemical science, sustainable energy, environment, and homeland security. To achieve our goals we have established a close alliance with applied mathematicians and computer scientists at Stony Brook and Columbia Universities.

DAVENPORT, J.

2005-11-01T23:59:59.000Z

371

New institute promotes nuclear security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

New institute promotes ... New institute promotes ... New institute promotes nuclear security Posted: February 11, 2013 - 3:27pm | Y-12 Report | Volume 9, Issue 2 | 2013 Disquieting headlines from recent news reports prompt an important question: Who has the breadth of knowledge and experience to help solve international nuclear challenges? "A lot of the keys for national nuclear security are right here in Oak Ridge - from processing uranium at Y-12 to developing medical isotopes at Oak Ridge National Laboratory to educating the populace through Oak Ridge Associated Universities," said Chris Clark, senior director of Y-12's Strategic Program Development. "But we were missing the policy side, which is what drives ORNL to develop new ideas, Y-12 to perform real-world missions and Oak Ridge Associated Universities to develop best

372

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

373

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

374

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA Briefings on Physical Security of Electricity Substations The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations. The session for FEMA Region IX will be held in San Jose, CA and hosted by

375

Independent Activity Report, Nevada National Security Site - July 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independent Activity Report, Nevada National Security Site - July Independent Activity Report, Nevada National Security Site - July 2011 Independent Activity Report, Nevada National Security Site - July 2011 July 2011 NNSS Operational Readiness Review of the Joint Actinide Shock Physics Experimental Research Facility [HIAR-NNSS-2011-07-28] At the request of the National Nuclear Security Administration (NNSA) Service Center, the U.S. Department of Energy (DOE) Office of Health, Safety and Security (HSS) site lead for the Nevada National Security Site (NNSS) participated in the NNSA Operational Readiness Review (ORR) of the Joint Actinide Shock Physics Experimental Research (JASPER) Facility Restart conducted on July 18-27, 2011. Independent Activity Report, Nevada National Security Site - July 2011 More Documents & Publications

376

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

377

Aperture center energy showcase  

SciTech Connect

Sandia and Forest City have established a Cooperative Research and Development Agreement (CRADA), and the partnership provides a unique opportunity to take technology research and development from demonstration to application in a sustainable community. A project under that CRADA, Aperture Center Energy Showcase, offers a means to develop exhibits and demonstrations that present feedback to community members, Sandia customers, and visitors. The technologies included in the showcase focus on renewable energy and its efficiency, and resilience. These technologies are generally scalable, and provide secure, efficient solutions to energy production, delivery, and usage. In addition to establishing an Energy Showcase, support offices and conference capabilities that facilitate research, collaboration, and demonstration were created. The Aperture Center project focuses on establishing a location that provides outreach, awareness, and demonstration of research findings, emerging technologies, and project developments to Sandia customers, visitors, and Mesa del Sol community members.

Torres, J. J.

2012-03-01T23:59:59.000Z

378

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

379

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

380

Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials  

E-Print Network (OSTI)

Stell,A.J. Sinnott,R.O. Ajayi,O. 2nd International Conference on Availability, Reliability and Security, (ARES??07), Vienna, Austria, April, 2007.

Stell, A.J.

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Nonproliferation | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation Home > About Us > Our Programs > Nonproliferation Nonproliferation One of the gravest threats the United States and the international community face is the possibility that terrorists or rogue nations will acquire nuclear weapons or other weapons of mass destruction (WMD). NNSA,

382

Security-by-design handbook.  

Science Conference Proceedings (OSTI)

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

383

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

384

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

385

International Institute for Sustainable Development Feed | Open Energy  

Open Energy Info (EERE)

Feed Feed Jump to: navigation, search Home | About | Inventory | Partnerships | Capacity Building | Webinars | Reports | Events | News | List Serve CLEAN Member Feeds Center for Environment and National Security at Scripps Centro de Energías Renovables (CER) The Children's Investment Fund Foundation (CIFF) Climate and Development Knowledge Network (CDKN) Climate Technology Initiative (CTI) ClimateWorks Foundation Coalition for Rainforest Nations (CfRN) Ecofys Energy Research Centre of the Netherlands (ECN) Energy Sector Management Assistance Program of the World Bank (ESMAP) Environment and Development Action in the Third World (ENDA-TM) German Aerospace Center (DLR) German Agency for International Cooperation (GIZ) Global Village Energy Partnership (GVEP) Information for Development Program (infoDev)

386

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

387

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

389

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

390

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

391

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

392

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

393

NNSA, Department of State, IAEA Conduct International Training...  

National Nuclear Security Administration (NNSA)

Department of State, IAEA Conduct International Training Course | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the...

394

Secretary Bodman Meets with Global Energy Ministers at the Internation...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

today to discuss the need for international efforts to increase individual and global energy security and encourage market stability. Energy Ministers from the world's major...

395

Cyber Security Solutions for Instrumentation and Control Systems, Topic 3: Security Status Monitoring  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced in response to continual threats to business and process control networks. Many standards have been drafted and subsequently revised and are now being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with the requirements set forth in the North American Electric Reliability Corporations Critical Infrastructure Protection standards and related requirements in the international ...

2013-11-08T23:59:59.000Z

396

Distributed Network Protocol (DNP3) Security Interoperability Testing 2012  

Science Conference Proceedings (OSTI)

This project encourages the adoption of the Distributed Network Protocol (DNP3) Secure Authentication specification through three approaches:Supporting development and review of the specification by industry experts in supervisory control and data acquisition (SCADA) and cryptographyAligning the specification with international standards performing similar functions, so that there is a common industry-wide approach to SCADA securityDeveloping ...

2012-12-31T23:59:59.000Z

397

Current News and Information | National Nuclear Security Administratio...  

National Nuclear Security Administration (NNSA)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

398

NNSA Celebrates Its 10th Anniversary | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

399

NNSA Completes B61 Warhead Refurbishment | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

400

FY 2012 National Security Technologies, LLC, PEP | National Nuclear...  

National Nuclear Security Administration (NNSA)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Last W56 Warhead Dismantled | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

402

July/August 2011 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

403

Fat Man Dropped on Nagasaki | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

404

DOE Announces Plans for WIPP | National Nuclear Security Administratio...  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

405

Workhorses: From Purple to Cielo (2010) | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

406

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

407

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

408

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

409

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

410

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

411

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

412

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

413

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

414

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

415

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

416

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

417

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

418

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

419

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

420

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

422

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

423

Secure and reliable operation of our  

E-Print Network (OSTI)

could use power plant cooling towers, for example, to disperse chem- ical or biological agents to national and international economy, security, and quality of life. Massoud Amin, Electric Power Research multiple sources, including system complexity, eco- nomic growth, deregulation, ter rorism, and even

Amin, S. Massoud

424

National Security Technology Incubation Strategic Plan  

Science Conference Proceedings (OSTI)

This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achieving sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.

None

2007-01-01T23:59:59.000Z

425

h t t p : / / w w w . n p s . e d u SCHOOL OF INTERNATIONAL GRADUATE STUDIES (SIGS)  

E-Print Network (OSTI)

of the Palgrave Macmillan series, Initiatives in Strategic Studies: Issues and Policies. Professor Wirtz is a past Science, Astropolitics, Comparative Strategy, Contemporary Security Policy, Defense Analysis, Harvard of Intelligence and Counterintelligence, International Security, International Studies Notes, Joint Forces

426

Status of Educational Efforts in National Security Workforce  

Science Conference Proceedings (OSTI)

This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

None

2008-03-31T23:59:59.000Z

427

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

428

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

429

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

430

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

431

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

432

Best Practices for the Security of Radioactive Materials  

Science Conference Proceedings (OSTI)

This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

Coulter, D.T.; Musolino, S.

2009-05-01T23:59:59.000Z

433

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

434

Securing Our Energy Future  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Our Energy Our Energy Securing Our Energy Future Future World Energy Demand Growing Dramatically 12 1400 1200 10 1000 2000 2050 2100 Population of Population of Industrialized Countries Industrialized Countries Wo W rl r d o ld Po P pu p la l ti t on o o u a i n Wo W rl r d E d ne n rg r y o l E e gy Co C ns n um u pt p io i n o s m t on Population (Billions) Energy Consumption (Qbtu / yr) 8 800 6 600 4 400 2 200 0 0 1900 1950 Year U.S. Electricity Generation by Fue U.S. Electricity Generation by Fuel Electric Generation by Fuel 1980 - 2030 (billion kilowatt-hours) 0 1000 2000 3000 4000 5000 6000 1980 1990 2000 2010 2020 2030 Renewables/Other Nuclear Natural Gas Petroleum Coal Source: EIA Annual Energy Outlook 2008 Why Do We Keep Coal in the Mix? Why Do We Keep Coal in the Mix? World Energy Reserves World Energy Reserves Source: Energy Information Administration/ International Reserves Data

435

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

436

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

437

The University of Texas at Dallas Callier Center for Communication Disorders  

E-Print Network (OSTI)

and billing record. Non Callier Center providers may have different policies or notices regarding their use to authorized federal officials for intelligence, counterintelligence, and other national security activities

O'Toole, Alice J.

438

Security data extraction from IEC 61850 ACSI models for network and system management  

Science Conference Proceedings (OSTI)

The international standard IEC 62351 proposed the format of abstract data object for secure smart grid controls which is named as Network and System Management (NSM). It is devised to respond not only deliberate attacks such as cyber hacking and sabotage, ... Keywords: IEC 61850, IEC 62351, network and system management, power grid security, smart grid security

Chung-Hyo Kim; Moon-Seok Choi; Seong-Ho Ju; Yong-Hun Lim; Jong-Mock Baek

2011-08-01T23:59:59.000Z

439

Security Policy, CMPC Marking Resource | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy, CMPC Marking Resource Policy, CMPC Marking Resource Security Policy, CMPC Marking Resource June 2012 Examples illustrate markings for matter that contains classified information. A strong and cohesive information security program is integral to national security. The U.S. Government requires certain information to be maintained in confidence to protect our citizens, democratic institutions, and activities within the international security community. Marking notifies holders of classified matter of the protection requirements for the information. Markings and designations serve two primary purposes: Alert holders to the presence of classified information. Warn holders of special access or safeguarding requirements. This resource was developed to assist Federal and contractor employees by

440

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Remarks by Administrator Thomas D'Agostino, National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

on NRC International Regulators Conference on Nuclear on NRC International Regulators Conference on Nuclear Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Speeches > Remarks by Administrator Thomas D'Agostino, National Nuclear ... Speech Remarks by Administrator Thomas D'Agostino, National Nuclear Security

442

Remarks by Administrator Thomas D'Agostino, National Nuclear Security  

National Nuclear Security Administration (NNSA)

on NRC International Regulators Conference on Nuclear on NRC International Regulators Conference on Nuclear Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Speeches > Remarks by Administrator Thomas D'Agostino, National Nuclear ... Speech Remarks by Administrator Thomas D'Agostino, National Nuclear Security

443

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Related Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Related Links Related Links NNSA Lab Directed Research and Development (LDRD) Lab Directed Research and Development Collaborations DOE Adanced Scientific Computing Research DTRA (Defense Threat Reduction Agency) NAS (National Academy of Sciences) NSF (National Science Foundation) DOD (Department of Defense) NASA Exascale Activities NNSA Exascale Environment Planning Workshop ASCR Co-Design Centers Supercomputing Top 500 List ASC at Supercomputing Conference Printer-friendly version Printer-friendly version Facebook

444

Help Center  

NLE Websites -- All DOE Office Websites (Extended Search)

Los Alamos National Laboratory Advanced Simulation and Computing Los Alamos National Laboratory Advanced Simulation and Computing Menu Events Partnerships Help Center Events Partnerships Help Center Videos Advanced Simulation and Computing Program » Help Center Computing Help Center Help hotlines, hours of operation, training, technical assistance, general information Los Alamos National Laboratory Hours: Monday through Friday, 8:00 a.m. - noon, 1:00-5:00 p.m. Mountain time Telephone: (505) 665-4444 option 3 Fax: (505) 665-6333 E-mail: consult@lanl.gov 24 hours a day, 7 days a week Operations (to report a system or network problem: (505) 667-2919 Lawrence Livermore National Laboratory Hours: Monday through Friday, 8:00 a.m. - noon, 1:00-4:45 p.m. Pacific time High Performance Hotline (technical consulting) Telephone: (925) 422-4532

445

Process Control Systems in the Chemical Industry: Safety vs. Security  

Science Conference Proceedings (OSTI)

Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nations critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

Jeffrey Hahn; Thomas Anderson

2005-04-01T23:59:59.000Z

446

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

447

Data validation and security for reprocessing.  

SciTech Connect

Next generation nuclear fuel cycle facilities will face strict requirements on security and safeguards of nuclear material. These requirements can result in expensive facilities. The purpose of this project was to investigate how to incorporate safeguards and security into one plant monitoring system early in the design process to take better advantage of all plant process data, to improve confidence in the operation of the plant, and to optimize costs. An existing reprocessing plant materials accountancy model was examined for use in evaluating integration of safeguards (both domestic and international) and security. International safeguards require independent, secure, and authenticated measurements for materials accountability--it may be best to design stand-alone systems in addition to domestic safeguards instrumentation to minimize impact on operations. In some cases, joint-use equipment may be appropriate. Existing domestic materials accountancy instrumentation can be used in conjunction with other monitoring equipment for plant security as well as through the use of material assurance indicators, a new metric for material control that is under development. Future efforts will take the results of this work to demonstrate integration on the reprocessing plant model.

Tolk, Keith Michael; Merkle, Peter Benedict; Duran, Felicia Angelica; Cipiti, Benjamin B.

2008-10-01T23:59:59.000Z

448

International Undergraduate Guide 2014/2015 entry  

E-Print Network (OSTI)

, cosmopolitan and cultured city, which offers a unique living and learning experience. One of the most vibrant satisfaction ratings for safety and security in the International Student Barometer survey. This cosmopolitan

Edinburgh, University of

449

8th International Symposium on Superalloy 718 and Derivatives  

Science Conference Proceedings (OSTI)

8th International Symposium on Superalloy 718 and Derivatives September 28- October 1, 2014. Marriott City Center Pittsburgh, Pennsylvania. ABSTRACT...

450

8th International Symposium on Superalloy 718 and Derivatives ...  

Science Conference Proceedings (OSTI)

Marriott City Center Pittsburgh, Pennsylvania. This international forum unites some of the world's most innovative materials processing minds.

451

Gregory H. Friedman: Before the Subcommittee on National Security, Veterans  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Subcommittee on National Security, Subcommittee on National Security, Veterans Affairs, and International Relations of the Committee on Government Reform U.S. House of Representatives Gregory H. Friedman: Before the Subcommittee on National Security, Veterans Affairs, and International Relations of the Committee on Government Reform U.S. House of Representatives March 15, 2001 Before the Subcommittee on National Security, Veterans Affairs, and International Relations of the Committee on Government Reform U.S. House of Representatives Statement of Gregory H. Friedman Inspector General Department of Energy Request to testify on the major performance and management challenges confronting the Department of Energy (Department). Recently, the Office of Inspector General (OIG) issued a special report on Management Challenges at

452

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

453

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

454

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

455

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

456

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

457

Best Practices in the Control Center  

Science Conference Proceedings (OSTI)

In this EPRI Whitepaper, CenterPoint Energy Inc. and EPRI personnel discuss the cyber security practices developed and deployed at CenterPoint's control center over the last decade. Founded in 1882, CenterPoint Energy Inc. owns 27,603 pole miles of overhead distribution lines and 3,727 circuit miles of overhead transmission lines, 19,690 circuit miles of underground distribution lines, 26 circuit miles of underground transmission lines, and 229 substation sites with a capacity of 51,400 megavolt amperes ...

2009-12-01T23:59:59.000Z

458

Related Sites | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Sites Related Sites Related Sites Links to the following sources of information are provided as resources. Listings are obtained from government, industry and trade organizations and from other resources. B&W Corporate B&W Corporate The Babcock & Wilcox Company is a leading international provider of energy products and services. B&W Lawrence Livermore Lawrence Livermore National Laboratory helps reduce and counter threats to national and global security through the advancement and application of science and technology. B&W Pantex Located in Amarillo, Texas, the Pantex Plant supports stockpile stewardship, nonproliferation, and safeguards and security. Government System for Award Management The System for Award Management (SAM) (formerly Central Contractor

459

SAFEGUARD AND SECURE CONTROL VERIFY POLICY  

National Nuclear Security Administration (NNSA)

Summer 2013 Summer 2013 National Nuclear Security Administration ENERGY U.S. DEPARTMENT OF Mendelsohn at the NIS Helm BY ELAINE SPECHT In November 2012, Kasia Mendelsohn was formally named assistant deputy administrator (ADA) of NNSA's Office of Nonproliferation and International Security (NIS). Highlights interviewed her on May 9, 2013, to discuss some of her recent activities and near-term initiatives for NIS. K asia Mendelsohn has come up through the ranks at NNSA, starting out as a contractor in NIS, where she spent five years as an

460

Nuclear Nonproliferation Program Offices | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation Program Offices | National Nuclear Security Nonproliferation Program Offices | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Nonproliferation Program Offices Home > About Us > Our Programs > Nonproliferation > Nuclear Nonproliferation Program Offices Nuclear Nonproliferation Program Offices One of the gravest threats the United States and the international

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Public Affairs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Public Affairs Home > Field Offices > Welcome to the Sandia Field Office > Public Affairs Public Affairs The SFO Public Affairs Director is responsible for all public affairs matters connected with the functions of SFO. In this capacity the Public Affairs Director is responsible for the development and management of the SFO public affairs programs including media relations, community relations, tribal relations, public participation, government/congressional relations, protocol, emergency public information, and internal employee communications and contractor oversight of these same programs. For public affairs assistance, please call (505) 845-5264. Printer-friendly version Printer-friendly version

462

Nuclear Nonproliferation Program Offices | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation Program Offices | National Nuclear Security Nonproliferation Program Offices | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Nonproliferation Program Offices Home > About Us > Our Programs > Nonproliferation > Nuclear Nonproliferation Program Offices Nuclear Nonproliferation Program Offices One of the gravest threats the United States and the international

463

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations  

Science Conference Proceedings (OSTI)

China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization ... Keywords: China, Cyber-security, Cyber-security related alliances, Cybercrime, International relations, International trade, Intrinsic and extrinsic motivations

Nir Kshetri

2013-03-01T23:59:59.000Z

464

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

465

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

466

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

467

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

468

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

469

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

470

Build the Best Data Center Facility for Your Business (paperback), 1st edition  

Science Conference Proceedings (OSTI)

A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize ...

Douglas Alger

2012-08-01T23:59:59.000Z

471

A National Tracking Center for Monitoring Shipments of HEU, MOX, and Spent Nuclear Fuel: How do we implement?  

SciTech Connect

Nuclear material safeguards specialists and instrument developers at US Department of Energy (USDOE) National Laboratories in the United States, sponsored by the National Nuclear Security Administration (NNSA) Office of NA-24, have been developing devices to monitor shipments of UF6 cylinders and other radioactive materials , . Tracking devices are being developed that are capable of monitoring shipments of valuable radioactive materials in real time, using the Global Positioning System (GPS). We envision that such devices will be extremely useful, if not essential, for monitoring the shipment of these important cargoes of nuclear material, including highly-enriched uranium (HEU), mixed plutonium/uranium oxide (MOX), spent nuclear fuel, and, potentially, other large radioactive sources. To ensure nuclear material security and safeguards, it is extremely important to track these materials because they contain so-called direct-use material which is material that if diverted and processed could potentially be used to develop clandestine nuclear weapons . Large sources could be used for a dirty bomb also known as a radioactive dispersal device (RDD). For that matter, any interdiction by an adversary regardless of intent demands a rapid response. To make the fullest use of such tracking devices, we propose a National Tracking Center. This paper describes what the attributes of such a center would be and how it could ultimately be the prototype for an International Tracking Center, possibly to be based in Vienna, at the International Atomic Energy Agency (IAEA).

Mark Schanfein

2009-07-01T23:59:59.000Z

472

Center Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

Resources for Planning Center Activities Resources for Planning Center Activities       QuarkNet at Work - Resources Home QuarkNet is a teacher professional development effort funded by the National Science Foundation and the US Department of Energy. Teachers work on particle physics experiments during a summer and join a cadre of scientists and teachers working to introduce some aspects of their research into their classrooms. This allows tomorrow's particle physicists to peek over the shoulder of today's experimenters. These resources are available for lead teachers and mentors at Quartnet Centers as they design activities for associate teacher workshops and follow-on activities. Important Findings from Previous Years Mentor Tips Associate Teacher Institute Toolkit

473

International Energy Outlook 2006  

Gasoline and Diesel Fuel Update (EIA)

Graphic Data Graphic Data International Energy Outlook 2006 Figure 1. World Marketed Energy Consumption by Region, 1980-2030 Figure 1 Data. Need help, contact the National Energy Information Center at 202-586-8800. Figure 2. World Delivered Energy Consumption by End-Use Sector, 2003-2030 Figure 2 Data. Need help, contact the National Energy Information Center at 202-586-8800. Figure 3. World Marketed Energy Use by Energy Type, 1980-2030 Figure 3 Data. Need help, contact the National Energy Information Center at 202-586-8800. Figure 4. Fuel Shares of World Marketed Energy Use, 2003, 2015, and 2030 Figure 4 Data. Need help, contact the National Energy Information Center at 202-586-8800. Figure 5. World Energy Consumption for Electricity Generation by Fuel Type, 2003, 2015, and 2030 Figure 5 Data. Need help, contact the National Energy Information Center at 202-586-8800.

474

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

475

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

476

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

477

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

478

International Border Management Systems (IBMS) Program : visions and strategies.  

SciTech Connect

Sandia National Laboratories (SNL), International Border Management Systems (IBMS) Program is working to establish a long-term border security strategy with United States Central Command (CENTCOM). Efforts are being made to synthesize border security capabilities and technologies maintained at the Laboratories, and coordinate with subject matter expertise from both the New Mexico and California offices. The vision for SNL is to provide science and technology support for international projects and engagements on border security.

McDaniel, Michael; Mohagheghi, Amir Hossein

2011-02-01T23:59:59.000Z

479

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

480

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

Note: This page contains sample records for the topic "international security center" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

HEADQUARTERS & CONVENTION CENTER FLOORPLANS  

Science Conference Proceedings (OSTI)

Cyber Caf. Moscone West Convention. Center. Lobby. General Poster Session. Moscone West Convention. Center. Exhibit Hall. Employment Referral. Center.

482

Dedicated Resource | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Dedicated Resource Dedicated Resource Dedicated Resource The Y-12 Technology Applications Center is a dedicated resource that performs only testing and evaluation programs. Y-12 TAC neither manufactures nor markets security technologies. Its independent and unbiased position enables the Center to complete each testing project to the highest standards of professional conduct and ethics. Our independent testing and evaluation process ensures the following: Greater level of competence by concentrating on testing and evaluation as a discipline Adherence to operational testing and evaluation standards and protocols Greater consistency in process and results Complete focus on the design and execution of testing activities Increased attention to the customer Y-12 TAC also serves as a resource to the National Nuclear Security

483

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

484

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

485

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

486

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

487

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

488

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

489

SOUTHVIEWDR Center for Applied  

E-Print Network (OSTI)

/Geology Chemistry Biological Sciences Geology Lab Bookstore Reed Milledge Payne Memorial Hall SANFORD DR Center CAES Activity Center Visitors Center (Four Towers) Greenhouses Center for Applied Isotope Study

Hall, Daniel

490

International Nonproliferation Export Control Program (INECP)  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and Nonproliferation and National Security Program > TNPS > Strategic Trade Control > International Programs > INECP Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr

491

Computerized international geothermal information systems  

DOE Green Energy (OSTI)

The computerized international geothermal energy information system is reviewed. The review covers establishment of the Italy - United States linked data centers by the NATO Committee on Challenges of Modern Society, through a bilateral agreement, and up to the present time. The result of the information exchange project is given as the bibliographic and numerical data available from the data centers. Recommendations for the exchange of computerized geothermal information at the international level are discussed.

Phillips, S.L.; Lawrence, J.D.; Lepman, S.R.

1980-03-01T23:59:59.000Z

492

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

493

Active QuarkNet Centers  

NLE Websites -- All DOE Office Websites (Extended Search)

Active QuarkNet Centers Active QuarkNet Centers       QuarkNet Home - Information - Calendar - Contacts - Projects - Forms: EoI - Teachers Centers on a Google Map @ the PTEC website Mentor List Sorted by: Last Name Institution Name First Year in Program Argonne National Laboratory - On sabbatical Black Hills State University Brown, Northeastern & Brandeis Universities Brookhaven National Laboratory, Columbia & Stony Brook Universities Chicago State University Colorado State University Fermilab & University of Chicago Florida Institute of Technology Florida International University Florida State University Hampton, George Mason, William & Mary Universities Idaho State University Indiana University - On sabbatical Johns Hopkins University

494

Los Alamos National Lab: National Security Science  

NLE Websites -- All DOE Office Websites (Extended Search)

Content stc logo Content stc logo Best of Show Winner of STC's International Summit Awards Competition, 2013 Top Innovations of the Year Science and technology for a safe, secure nation Impenetrable encryption defends data from cyberterrorism keyboard with atrack button A hacker could crack a code, steal private information or shut down systems we rely on daily. Small enough to fit in a smart phone, our QkarD technology ("kee-u-kard") provides virtually impenetrable defense, using quantum cryptography to secure computers. This novel encryption generates security at the subatomic particle level. If someone tries to hack in, that particle is altered, and the owner quietly alerted. And it works-even against super-powerful quantum computers. Multipronged HIV vaccine shows promise in monkeys

495

287 Security Blunders You Should Avoid  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Blunders ! Security Blunders ! You Should Avoid" Jon S. Warner, Ph.D. Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne National Laboratory 630-252-6168 rogerj@anl.gov http://www.ne.anl.gov/capabilities/vat Presentation for the ASIS International Annual Meeting! Anaheim, CA, September 21-24, 2009! Sponsors! *! DHS! *! DoD! *! DOS! *! IAEA! *! Euratom! *! DOE/NNSA! *! private companies! *! intelligence agencies! *! public interest organizations! The VAT has done detailed ! vulnerability assessments on! hundreds of different security! devices, systems, & programs.! Vulnerability Assessment Team (VAT)" The greatest of faults, I should say, is to be conscious of none. -- Thomas Carlyle (1795-1881) A multi-disciplinary team of physicists,

496

International Children's Book Day  

E-Print Network (OSTI)

International Children's Book Day April 2nd 2013 Folktales Storytelling & wORKSHOP By Barry Stewart, Lobby 2pm ­ 3 pm: UF Smathers Library, Room 1A Books with WingsBy Peter Sís 7pm ­ 9pm: PK Yonge Performing Arts Center 1080 SW 11th Street, Gainesville Peter Sís Award Winning Children's Book Author

Watson, Craig A.

497

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

498

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

499

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

500

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z