National Library of Energy BETA

Sample records for kernel security bug

  1. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Broader source: Energy.gov (indexed) [DOE]

    Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

  2. Identifying Security Bug Reports via Text Mining: An Industrial Case Study Michael Gegick, 2

    E-Print Network [OSTI]

    Xie, Tao

    Identifying Security Bug Reports via Text Mining: An Industrial Case Study 1 Michael Gegick, 2 Pete such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters submit bug reports to a bug-tracking system, the bug reporters need

  3. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and...

    Office of Environmental Management (EM)

    12: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 -...

  4. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  5. Comprehensive Kernel Instrumentation via Dynamic Binary Translation

    E-Print Network [OSTI]

    Toronto, University of

    Comprehensive Kernel Instrumentation via Dynamic Binary Translation Peter Feiner Angela Demke Brown, bug-finding, and security tools. Such tools are currently not available for operating system (OS handlers and device drivers, enabling comprehensive instrumentation of the OS without imposing any overhead

  6. Boxelder Bugs 

    E-Print Network [OSTI]

    Brown, Wizzie

    2007-07-27

    - ally move toward the windows or other sunny areas. Occasionally on warm winter days, boxelder bugs move from their protected areas to sun themselves. Host plants Boxelder bugs feed primarily on the seeds of female boxelder trees. Minor host plants...

  7. Bed Bugs 

    E-Print Network [OSTI]

    Gold, Roger E.; Howell Jr., Harry N.

    2001-11-15

    stream_source_info pdf_1512.pdf.txt stream_content_type text/plain stream_size 5811 Content-Encoding ISO-8859-1 stream_name pdf_1512.pdf.txt Content-Type text/plain; charset=ISO-8859-1 Bed Bugs L-1742 9-01 Roger Gold...

  8. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions...

  9. Bug Prediction Made Supervisor: Haidar Osman

    E-Print Network [OSTI]

    Jäger, Gerhard

    >1.0 #12;Predicting the number of bugs from change metrics in Equinox #12;Predicting the number of bugs from change metrics in Equinox #12;. .

  10. Foiling the Flu Bug Global Partnerships for Nuclear Energy

    E-Print Network [OSTI]

    1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

  11. Bugs in Your Shopping Cart:Bugs in Your Shopping Cart: A TaxonomyA Taxonomy

    E-Print Network [OSTI]

    Bugs in Your Shopping Cart:Bugs in Your Shopping Cart: A TaxonomyA Taxonomy Giri Vijayaraghavan-2002. Quality Week 2002 The Bug TaxonomyThe Bug Taxonomy · An outline that categorizes and lists a large number of potential bugs. · The tester who uses the taxonomy can sample from the list, selecting a potential problem

  12. BOXELDER BUGS Department of Entomology

    E-Print Network [OSTI]

    Pittendrigh, Barry

    they invade homes. When fall tem- peratures begin to drop, adults search for protected cracks and crevices the rooms. Description Adult boxelder bugs are approximately 1/2 inch in length, dark brown to black but are generally similar in shape to the adults. Boxelder bug: Leptocoris trivittatus (Say) Adult Nymph Life Cycle

  13. Bed BugsBed Bugs Bed bugs are small, wingless insects that

    E-Print Network [OSTI]

    Ishida, Yuko

    insecticide treatments. If you are a renter, contact your landlord or property owner to help manage't control bed bugs. Remove or heat-treat infested materials, and seal hiding spots to prevent future infestations. Inspect after treatments to be sure bugs are gone. May 2015 Minimize the use of pesticides

  14. UPC Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With WIPP UPDATE:AdministrationfollowingReports UPC Bug Reports

  15. UPC Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With WIPP UPDATE:AdministrationfollowingReports UPC Bug

  16. GNU Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear PhysicsGE Global ResearchGNU » GNU Bug

  17. When Would This Bug Get Reported? Ferdian Thung1

    E-Print Network [OSTI]

    California at Davis, University of

    . To investigate bug reporting latencies, we analyze bugs from three Java software systems: AspectJ, Rhino

  18. Team Bug Bag Biogas For Nicaragua

    E-Print Network [OSTI]

    Demirel, Melik C.

    Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

  19. Chinch Bugs in St. Augustine Lawns 

    E-Print Network [OSTI]

    Merchant, Michael E.; Mott, Dale

    2006-10-17

    Chinch bugs can be extremely damaging to home lawns. Their feeding causes small yellow or brown areas in lawns. Chinch bugs can usually be seen on careful inspection of the soil surface. Insecticides provide effective control....

  20. The Harlequin Cabbage-bug

    E-Print Network [OSTI]

    Paddock, F.B. (Floyd B.)

    1915-01-01

    - IvrOLOGIST. Most everv one in Tesas who grows anr- cabbage is familiar with this insect, lin0~~11 also by such names aF "terrapin-bug," cccalico-back," ancl '(fire-l)l~g." This insect $ems to be present in most every garden and field in the State... low mor- tality of the hibernating bugs. Since this insect is practicallv free ' from the att:~cks of predaceous enemies and parasites, the control of it depends mostly upon the grower's efforts. ORIGIN .4ND DISTRIBUTION. The origin21 home...

  1. JDF: Detecting Duplicate Bug Reports in Jazz Yoonki Song1

    E-Print Network [OSTI]

    Xie, Tao

    JDF: Detecting Duplicate Bug Reports in Jazz Yoonki Song1 Xiaoyin Wang2,3 Tao Xie1 Lu Zhang2 and users submit bug reports to a bug repository. These reports can help reveal defects and improve software qual- ity. As the number of bug reports in a bug repository increases, the number of the potential

  2. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  3. Published in ACSAC'08: Proceedings of the 24th Annual Computer Security Applications Conference, Anaheim, CA, December 2008 Automatic Inference and Enforcement of Kernel Data Structure Invariants

    E-Print Network [OSTI]

    Iftode, Liviu

    data structures, such as the system call table and values of function point- ers, recent work has that hold control data, such as the system call table and jump tables, have long been a popular target, Anaheim, CA, December 2008 Automatic Inference and Enforcement of Kernel Data Structure Invariants Arati

  4. MEDICAL ENTOMOLOGY Repellency of Selected Chemicals Against the Bed Bug

    E-Print Network [OSTI]

    Wang, Changlu

    MEDICAL ENTOMOLOGY Repellency of Selected Chemicals Against the Bed Bug (Hemiptera: Cimicidae and bed bug bites. KEY WORDS bed bug, repellent, DEET, natural product, essential oil Since the late 1990s

  5. There are currently no significant reported user bugs with the...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1-800-66-NERSC, option 3 or 510-486-8611 GNU bugs Home For Users Software Compilers GNU GNU Bug Reports There are currently no significant reported user bugs...

  6. TRULY SECURE? NOT NECESSARILY SO. 31Truly Secure? Not Necessarily So.

    E-Print Network [OSTI]

    Ottino, Julio M.

    Cormick, the Heartbleed bug symbolizes a broader trend. He observes that developers often push new software or mobile apps. Run the latest anti-virus software. Order only from the most trusted online vendors. Your online software programming bug called Heartbleed. The flaw had exposed a loophole in the OpenSSL security

  7. Protecting Kernels from Untrusted Modules using Dynamic Binary Instrumentation

    E-Print Network [OSTI]

    Goel, Ashvin

    Protecting Kernels from Untrusted Modules using Dynamic Binary Instrumentation University · virtualization · Secure only modules whose source code is available (BGI, · LXFI, etc.) · Many modules is manageable · Data consistency is challenging Dynamic Binary Instrumentation Goals and Approach Challenges Two

  8. Experiences Using Static Analysis to Find Bugs

    E-Print Network [OSTI]

    Cortes, Corinna

    , FindBugs, code quality, bug patterns, software defects, software quality ! 1 INTRODUCTION SOFTWARE to improve software quality, including testing, code review, and for- mal specification. Find with relatively simple techniques and to help us understand how such tools can be incorporated into the software

  9. Scalable Statistical Bug Isolation Computer Sciences Department

    E-Print Network [OSTI]

    Aiken, Alex

    algorithm that isolates bugs in programs containing multiple undiagnosed bugs. Earlier statistical Descriptors D.2.4 [Software Engineer- ing]: Software/Program Verification--statistical methods; D.2 with a program point may or may not be tested each time the program point is reached). A feedback report R

  10. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Energy Savers [EERE]

    279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code...

  11. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  12. Microsoft Word - Final BUGS article final.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of a good peak resource (Figure 1). Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load ...

  13. There are currently no significant reported user bugs with CAF...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1-800-66-NERSC, option 3 or 510-486-8611 Home For Users Software Compilers CAF (Coarray Fortran) CAF Bug Reports There are currently no significant...

  14. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  15. Phoenix: Detecting and Recovering from Permanent Processor Design Bugs

    E-Print Network [OSTI]

    Torrellas, Josep

    Phoenix: Detecting and Recovering from Permanent Processor Design Bugs with Programmable Hardware://iacoma.cs.uiuc.edu 14 Phoenix Conceptual Design Signature Buffer Bug Detection Unit (BDU) Global Recovery Unit Signal of Phoenix Subsystem SSUBDU Subsystem BDUSSUHUB Neighborhood To Recovery Unit IO Cntrl.L1 CacheFetch Unit

  16. 1Practical Guide to Bed Bug Prevention --E-261-W Household & Structural

    E-Print Network [OSTI]

    Pittendrigh, Barry

    of Entomology Bed bug bite. (Photo credit: Tom Myers) *Multipule-family housing units are often thought with a known or suspected bed bug problem. Immediate help is critical to avoid spreading bed bugs. (Photo credit: Tom Myers) tions or asthma, especially in children. Bed bugs must feed several times

  17. An Approach to Detecting Duplicate Bug Reports using Natural Language and Execution Information

    E-Print Network [OSTI]

    Xie, Tao

    An Approach to Detecting Duplicate Bug Reports using Natural Language and Execution Information source project typically maintains an open bug reposi- tory so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository, a person, called a triager

  18. The Bug-Rivet Paradox An idealised bug of negligible dimensions is hiding

    E-Print Network [OSTI]

    George, Glyn

    of length L . A rivet has a shaft length of a = the Lorentz factor). From the point of view (frame of reference) of the bug, the rivet shaft is even shorter to travel down the shaft of the rivet. Until each part of the shaft receives the information that the rivet

  19. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2:ServersVulnerability

  20. U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScriptingVulnerability |Department

  1. V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department ofDepartment

  2. Robotic intelligence kernel

    DOE Patents [OSTI]

    Bruemmer, David J. (Idaho Falls, ID)

    2009-11-17

    A robot platform includes perceptors, locomotors, and a system controller. The system controller executes a robot intelligence kernel (RIK) that includes a multi-level architecture and a dynamic autonomy structure. The multi-level architecture includes a robot behavior level for defining robot behaviors, that incorporate robot attributes and a cognitive level for defining conduct modules that blend an adaptive interaction between predefined decision functions and the robot behaviors. The dynamic autonomy structure is configured for modifying a transaction capacity between an operator intervention and a robot initiative and may include multiple levels with at least a teleoperation mode configured to maximize the operator intervention and minimize the robot initiative and an autonomous mode configured to minimize the operator intervention and maximize the robot initiative. Within the RIK at least the cognitive level includes the dynamic autonomy structure.

  3. An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps Pamela Bhattacharya Liudmila Ulanova Iulian Neamtiu Sai Charan Koduru

    E-Print Network [OSTI]

    Zordan, Victor

    An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps Pamela Bhattacharya applications. Therefore, in this paper, we perform an in-depth empirical study on bugs in the Google Android smartphone platform and 24 widely-used open-source Android apps from diverse categories such as communication

  4. The Augmented Complex Kernel LMS

    E-Print Network [OSTI]

    Bouboulis, Pantelis; Mavroforakis, Michael

    2011-01-01

    Recently, a unified framework for adaptive kernel based signal processing of complex data was presented by the authors, which, besides offering techniques to map the input data to complex Reproducing Kernel Hilbert Spaces, developed a suitable Wirtinger-like Calculus for general Hilbert Spaces. In this short paper, the extended Wirtinger's calculus is adopted to derive complex kernel-based widely-linear estimation filters. Furthermore, we illuminate several important characteristics of the widely linear filters. We show that, although in many cases the gains from adopting widely linear estimation filters, as alternatives to ordinary linear ones, are rudimentary, for the case of kernel based widely linear filters significant performance improvements can be obtained.

  5. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    No solution was available at the time of this entry. Addthis Related Articles U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  6. Has the Bug Really Been Fixed? Zhongxian Gu Earl T. Barr David J. Hamilton Zhendong Su

    E-Print Network [OSTI]

    Su, Zhendong

    bugs. To confirm this folklore, we explored bug databases of the Ant, AspectJ, and Rhino projects implemented FIXATION, a proto- type that automatically detects bad fixes for Java programs. When it detects

  7. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

  8. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

  9. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Environmental Management (EM)

    5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9,...

  10. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  11. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory...

  12. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain...

  13. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Energy Savers [EERE]

    V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

  14. Integrated Pest Management for Home Gardeners and Landscape Professionals Bagrada Bug

    E-Print Network [OSTI]

    Ishida, Yuko

    was found in Fresno, Tulare, and Monterey counties. Other states where this stink bug is currently found

  15. Kernel-Kernel Communication in a Shared-Memory Multiprocessor

    E-Print Network [OSTI]

    Scott, Michael L.

    , in which each instance of the kernel performs local operations directly and uses remote invocation, the Federal University of Rio de Janeiro, and the Brazilian National Research Council. Eliseu Chaves), prakash@transarc.com, marsh@mitl.com, and {leblanc,scott}@cs.rochester.edu. Tech. Rep. 368, Apr. 1991 #12

  16. Fast Kernel-Based Independent Component Analysis

    E-Print Network [OSTI]

    McAuliffe, Jon

    Fast Kernel-Based Independent Component Analysis Hao Shen , Stefanie Jegelka and Arthur Gretton instance, sources with near-zero kurtosis). FastKICA (Fast HSIC-based Kernel ICA) is a new optimisation-based ICA algorithms, FastKICA is applicable to any twice differentiable kernel function. Experimental

  17. Adaptive wiener image restoration kernel

    DOE Patents [OSTI]

    Yuan, Ding (Henderson, NV)

    2007-06-05

    A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

  18. Vi rtuali zed Multi kernel

    E-Print Network [OSTI]

    Quest­V: A Vi rtuali zed Multi kernel for Hi gh­Confidence Systems Ye Li BostonU niversity ########## #### Matthew Danish BostonU niversity ######## #### Richard West BostonU niversity ############## #### Abstract operating together as a dis­ tributed system on a chip. Quest­V uses virtualization techniques to isolate

  19. Improving Bug Localization using Correlations in Crash Reports

    E-Print Network [OSTI]

    Zou, Ying

    Improving Bug Localization using Correlations in Crash Reports Shaohua Wang School of Computing organizations rely on automatic problem reporting tools to collect crash reports directly from users' environments. These crash reports are later grouped together into crash types. Usually, developers prioritize

  20. Automatic Bug Detection in Microcontroller Software by Static Program Analysis

    E-Print Network [OSTI]

    Huuck, Ralf

    . The software is highly hardware and platform specific, and bugs are often a consequence of neglecting subtle analyzer Goanna. Finally, we illustrate the results by a case study of an automotive application. The case-cost and high-reliability is paramount. Such systems can be found in the automotive, entertainment, aerospace

  1. Kernel Regression in the Presence of Correlated Errors Kernel Regression in the Presence of Correlated Errors

    E-Print Network [OSTI]

    Kernel Regression in the Presence of Correlated Errors Kernel Regression in the Presence in nonparametric regression is difficult in the presence of correlated errors. There exist a wide variety vector machines for regression. Keywords: nonparametric regression, correlated errors, bandwidth choice

  2. Pricing Kernel Specification for User Cost of Monetary Assets

    E-Print Network [OSTI]

    Zhou, Wei

    2007-04-27

    This paper studies the nonlinear asset pricing kernel approximation by using orthonormal polynomials of state variables in which the pricing kernel specification is restricted by preference theory. We approximate the true asset pricing kernel...

  3. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM:...

  4. Electrochromism vs. the Bugs:DevelopingWO3 Thin Film Windows...

    Office of Scientific and Technical Information (OSTI)

    Electrochromism vs. the Bugs:DevelopingWO3 Thin Film Windows toControl Photoactive Biological Systems. Citation Details In-Document Search Title: Electrochromism vs. the...

  5. Taxonomy and phylogeny of the Central European bug genus Psallus (Hemiptera, Miridae) and

    E-Print Network [OSTI]

    Amrhein, Valentin

    Taxonomy and phylogeny of the Central European bug genus Psallus (Hemiptera, Miridae, Miridae): phylogeny and taxonomy ..............................................................5 1 ...................................................................................................14 3.3 Taxonomy of Central European taxa

  6. SUBSPACE REGRESSION IN REPRODUCING KERNEL HILBERT SPACE

    E-Print Network [OSTI]

    SUBSPACE REGRESSION IN REPRODUCING KERNEL HILBERT SPACE L. Hoegaerts #3; J.A.K. Suykens #3; J: We focus on three methods for finding a suitable subspace for regression in a reproducing kernel correlation analysis and we demonstrate how this fits within a more general context of subspace regression

  7. The Complex Gaussian Kernel LMS algorithm

    E-Print Network [OSTI]

    Bouboulis, Pantelis

    2010-01-01

    Although the real reproducing kernels are used in an increasing number of machine learning problems, complex kernels have not, yet, been used, in spite of their potential interest in applications such as communications. In this work, we focus our attention on the complex gaussian kernel and its possible application in the complex Kernel LMS algorithm. In order to derive the gradients needed to develop the complex kernel LMS (CKLMS), we employ the powerful tool of Wirtinger's Calculus, which has recently attracted much attention in the signal processing community. Writinger's calculus simplifies computations and offers an elegant tool for treating complex signals. To this end, the notion of Writinger's calculus is extended to include complex RKHSs. Experiments verify that the CKLMS offers significant performance improvements over the traditional complex LMS or Widely Linear complex LMS (WL-LMS) algorithms, when dealing with nonlinearities.

  8. Understanding the Triaging and Fixing Processes of Long Lived Bugs Ripon K. Saha, Sarfraz Khurshid, Dewayne E. Perry

    E-Print Network [OSTI]

    Perry, Dewayne E.

    Understanding the Triaging and Fixing Processes of Long Lived Bugs Ripon K. Saha, Sarfraz Khurshid- velopers/managers triage bugs carefully and schedule Email addresses: ripon@utexas.edu (Ripon K. Saha

  9. STUDIA UNIV. BABESBOLYAI, INFORMATICA, Volume XLV, Number 1, 2000 CLASSIFYING SOFTWARE BUG REPORTS USING METHODS

    E-Print Network [OSTI]

    Baader, Franz

    REPORTS USING METHODS FROM FORMAL CONCEPT ANALYSIS DANIEL BORCHMANN, RAFAEL PE~NALOZA, AND WENQIAN WANG of classifying software bug reports characterized by dis- tinguished features. More specifically, we investigate the situation where we are given a set of already processed bug reports together with the components

  10. Classifying Field Crash Reports for Fixing Bugs : A Case Study of Mozilla Firefox

    E-Print Network [OSTI]

    Zou, Ying

    Classifying Field Crash Reports for Fixing Bugs : A Case Study of Mozilla Firefox Tejinder Dhaliwal collection of field crash-reports which record the stack traces and other runtime information when crashes occur. Analysis of field crash-reports can help developers to locate and fix bugs. However, the amount

  11. Matrix kernels for measures on partitions

    E-Print Network [OSTI]

    Eugene Strahov

    2008-09-10

    We consider the problem of computation of the correlation functions for the z-measures with the deformation (Jack) parameters 2 or 1/2. Such measures on partitions are originated from the representation theory of the infinite symmetric group, and in many ways are similar to the ensembles of Random Matrix Theory of $\\beta=4$ or $\\beta=1$ symmetry types. For a certain class of such measures we show that correlation functions can be represented as Pfaffians including $2\\times 2$ matrix valued kernels, and compute these kernels explicitly. We also give contour integral representations for correlation kernels of closely connected measures on partitions.

  12. GILK: A dynamic instrumentation tool for the Linux Kernel

    E-Print Network [OSTI]

    Pearce, David J.

    GILK: A dynamic instrumentation tool for the Linux Kernel David J. Pearce, Paul H.J. Kelly, Tony Abstract. This paper describes a dynamic instrumentation tool for the Linux Kernel which allows a stock Linux kernel to be modi#12;ed while in ex- ecution, with instruments implemented as kernel modules

  13. ARCHITECTURE FOR A PORTABLE OPEN SOURCE REAL TIME KERNEL ENVIRONMENT

    E-Print Network [OSTI]

    Lipari, Giuseppe

    to the automotive industry. The set of tools comprises a schedulability analyzer, a kernel library and a kernel con platforms without sacri#28;cing performance. With our tools, the programmer only need to write of an Open Source Real Time Kernel for embedded automotive applications. Developing a kernel

  14. Extension of Wirtinger's Calculus in Reproducing Kernel Hilbert Spaces and the Complex Kernel LMS

    E-Print Network [OSTI]

    Bouboulis, Pantelis

    2010-01-01

    Over the last decade, kernel methods for nonlinear processing have successfully been used in the machine learning community. The primary mathematical tool employed in these methods is the notion of the Reproducing Kernel Hilbert Space. However, so far, the emphasis has been on batch techniques. It is only recently, that online techniques have been considered in the context of adaptive signal processing tasks. Moreover, these efforts have only been focussed on and real valued data sequences. To the best of our knowledge, no kernel-based strategy has been developed, so far, that is able to deal with complex valued signals. In this paper, we present a general framework to attack the problem of adaptive filtering of complex signals, using either real reproducing kernels, taking advantage of a technique called \\textit{complexification} of real RKHSs, or complex reproducing kernels, highlighting the use of the complex gaussian kernel. In order to derive gradients of operators that need to be defined on the associat...

  15. T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500

    Broader source: Energy.gov [DOE]

    The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

  16. Difference image analysis: Automatic kernel design using information criteria

    E-Print Network [OSTI]

    Bramich, D M; Alsubai, K A; Bachelet, E; Mislis, D; Parley, N

    2015-01-01

    We present a selection of methods for automatically constructing an optimal kernel model for difference image analysis which require very few external parameters to control the kernel design. Each method consists of two components; namely, a kernel design algorithm to generate a set of candidate kernel models, and a model selection criterion to select the simplest kernel model from the candidate models that provides a sufficiently good fit to the target image. We restricted our attention to the case of solving for a spatially-invariant convolution kernel composed of delta basis functions, and we considered 19 different kernel solution methods including six employing kernel regularisation. We tested these kernel solution methods by performing a comprehensive set of image simulations and investigating how their performance in terms of model error, fit quality, and photometric accuracy depends on the properties of the reference and target images. We find that the irregular kernel design algorithm employing unreg...

  17. Fractal Weyl law for Linux Kernel Architecture

    E-Print Network [OSTI]

    L. Ermann; A. D. Chepelianskii; D. L. Shepelyansky

    2010-09-16

    We study the properties of spectrum and eigenstates of the Google matrix of a directed network formed by the procedure calls in the Linux Kernel. Our results obtained for various versions of the Linux Kernel show that the spectrum is characterized by the fractal Weyl law established recently for systems of quantum chaotic scattering and the Perron-Frobenius operators of dynamical maps. The fractal Weyl exponent is found to be $\

  18. SVMs with Profile-Based Kernels 1 Support Vector Machines with Profile-Based Kernels for

    E-Print Network [OSTI]

    Pace, Gordon J.

    amount of new protein sequences. The resulting sequences describe a protein in terms of the amino acids, the frequency that each amino acid appears in that column. Once a profile is available, a new sequence canSVMs with Profile-Based Kernels 1 Support Vector Machines with Profile-Based Kernels for Remote

  19. Fast generation of sparse random kernel graphs

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hagberg, Aric; Lemons, Nathan; Du, Wen -Bo

    2015-09-10

    The development of kernel-based inhomogeneous random graphs has provided models that are flexible enough to capture many observed characteristics of real networks, and that are also mathematically tractable. We specify a class of inhomogeneous random graph models, called random kernel graphs, that produces sparse graphs with tunable graph properties, and we develop an efficient generation algorithm to sample random instances from this model. As real-world networks are usually large, it is essential that the run-time of generation algorithms scales better than quadratically in the number of vertices n. We show that for many practical kernels our algorithm runs in timemore »at most ?(n(logn)²). As an example, we show how to generate samples of power-law degree distribution graphs with tunable assortativity.« less

  20. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

  1. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were...

  2. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated...

  3. Experimental study of turbulent flame kernel propagation

    SciTech Connect (OSTI)

    Mansour, Mohy [National Institute of Laser Enhanced Sciences, Cairo University, Giza (Egypt); Peters, Norbert; Schrader, Lars-Uve [Institute of Combustion Technology, Aachen (Germany)

    2008-07-15

    Flame kernels in spark ignited combustion systems dominate the flame propagation and combustion stability and performance. They are likely controlled by the spark energy, flow field and mixing field. The aim of the present work is to experimentally investigate the structure and propagation of the flame kernel in turbulent premixed methane flow using advanced laser-based techniques. The spark is generated using pulsed Nd:YAG laser with 20 mJ pulse energy in order to avoid the effect of the electrodes on the flame kernel structure and the variation of spark energy from shot-to-shot. Four flames have been investigated at equivalence ratios, {phi}{sub j}, of 0.8 and 1.0 and jet velocities, U{sub j}, of 6 and 12 m/s. A combined two-dimensional Rayleigh and LIPF-OH technique has been applied. The flame kernel structure has been collected at several time intervals from the laser ignition between 10 {mu}s and 2 ms. The data show that the flame kernel structure starts with spherical shape and changes gradually to peanut-like, then to mushroom-like and finally disturbed by the turbulence. The mushroom-like structure lasts longer in the stoichiometric and slower jet velocity. The growth rate of the average flame kernel radius is divided into two linear relations; the first one during the first 100 {mu}s is almost three times faster than that at the later stage between 100 and 2000 {mu}s. The flame propagation is slightly faster in leaner flames. The trends of the flame propagation, flame radius, flame cross-sectional area and mean flame temperature are related to the jet velocity and equivalence ratio. The relations obtained in the present work allow the prediction of any of these parameters at different conditions. (author)

  4. On fusion kernel in Liouville theory

    E-Print Network [OSTI]

    Nikita Nemkov

    2014-09-29

    We study fusion kernel for non-degenerate conformal blocks in Liouville theory as a solution to the difference equations originating from the pentagon identity. We suggest an approach to these equations based on 'non-perturbative' series expansion which allows to calculate the fusion kernel iteratively. We also find the exact solutions for the cases when the central charge is $c=1+6(b-b^{-1})^2$ and $b~\\in \\mathbb{N}$. For $c = 1$ our result reproduces the formula, obtained earlier from analytical continuation via Painlev\\'e equation. However, in our case it appears in a significantly simplified form.

  5. Black Kernel and White Tip of Rice. 

    E-Print Network [OSTI]

    Martin, Alan L. (Alan La Mott); Altstatt, G. E. (George E.)

    1940-01-01

    . Amer. Jour. Bot. 26 :P46-852. 1939. Taubenhaus, J. J. Rice diseases. In 50th Ann. Rpt. Tex. Agr. Sta., pp. 114-115. 1937. Taubenhaus, J. J., Altstatt, G. E., and Wyche, R. H. Black kernel of rice. In 4Fth Ann. Rpt. Texas Am. Exp. Sta., p. 94. 1935.... Taubenhaus, J. J., and Wyche, R. H. Rice Diseases. In 49th Ann. Rpt. Texas Agr. Exp. Sta., pp. 109-111. 1936. Tullis, E. C. Fungi isolated from discolored rice kernels. U. S. Dept. Agr. Tech. Bull. 540. 1936. ...

  6. An Undergraduate Course on Software Bug Detection Tools and Techniques

    E-Print Network [OSTI]

    Larson, Eric

    Science Education ­ Computer Science Education D.2.5 [Software Engineering]: Testing and Debugging ­ symbolic execution, testing tools. General Terms Reliability, Security, Verification. Keywords software testing, software verification, computer security, compilers, software engineering, computer science

  7. Linux Kernel Co-Scheduling For Bulk Synchronous Parallel Applications...

    Office of Scientific and Technical Information (OSTI)

    INFORMATION SCIENCE; ALGORITHMS; DESIGN; IMPLEMENTATION; KERNELS; PERFORMANCE; SUPERCOMPUTERS Operating systems; OS noise; OS interference; co-scheduling; coordinated scheduling...

  8. Kernel Machine Based Feature Extraction Algorithms for Regression Problems

    E-Print Network [OSTI]

    Szepesvari, Csaba

    Kernel Machine Based Feature Extraction Algorithms for Regression Problems Csaba Szepesv´ari 1 and Andr´as Kocsor and Korn´el Kov´acs 2 Abstract. In this paper we consider two novel kernel machine based performance of the algorithm. The second algo- rithm combines kernel machines with average derivative

  9. Pluricomplex Green function, pluricomplex Poisson kernel and

    E-Print Network [OSTI]

    Bracci, Filippo

    resem- bles completely the one dimensional equation giving rise to the Green function. More or lessPluricomplex Green function, pluricomplex Poisson kernel and applications FILIPPO BRACCI fbracci@mat.uniroma2.it Abstract. This is a small survey about the pluricomplex Green function of M

  10. Measurements of the Thermal Neutron Scattering Kernel

    E-Print Network [OSTI]

    Danon, Yaron

    Measurements of the Thermal Neutron Scattering Kernel Li (Emily) Liu, Yaron Danon, Bjorn Becker and discussions Problems and Future study Questions #12;3 M. Mattes and J. Keinert, Thermal Neutron Scattering experimental data used was from 1973-1974! M. Mattes and J. Keinert, Thermal Neutron Scattering Data

  11. Mismatch String Kernels for SVM Protein Classification

    E-Print Network [OSTI]

    Noble, William Stafford

    machines (SVMs) in a discriminative approach to the protein classification problem. These kernels measure efficiently using a mismatch tree data structure and report experiments on a benchmark SCOP dataset, where we savings. 1 Introduction A fundamental problem in computational biology is the classification of proteins

  12. Silver Lining: Enforcing Secure Information Flow at the Cloud Edge Safwan Mahmud Khan, Kevin W. Hamlen and Murat Kantarcioglu

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    Silver Lining: Enforcing Secure Information Flow at the Cloud Edge Safwan Mahmud Khan, Kevin W to the cloud kernel software, OS/hypervisor, VM, or cloud file system, SilverLine automatically in-lines secure information flow security for Hadoop clouds with easy maintainability (through modularity) and low overhead

  13. ENCOURAGING RESULTS IN FABI/TPCP BIOCONTROL The fight against the ravages of the bronze bug, Thaumastocoris peregrinus, in commercial

    E-Print Network [OSTI]

    be used as source sites to further spread this biocontrol agent in areas where bronze bug infestations: Adult male of the bronze bug (Thaumastocoris peregrinus). 5: Cleruchoides noackae, the biocontrol agentENCOURAGING RESULTS IN FABI/TPCP BIOCONTROL PROGRAMME The fight against the ravages of the bronze

  14. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing ToolInternational Affairs, Before theFebruary 1,7/109 HistoricalResources46: Debianupdate

  15. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for39: Debian update

  16. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof

  17. Unsupervised State-Space Modelling Using Reproducing Kernels

    E-Print Network [OSTI]

    Tobar, Felipe; Djuri?, Petar M.; Mandic, Danilo P.

    2015-06-22

    gradient- based methods. These include ridge regression (RR) in the offline case, and least mean square (LMS) and recursive least squares (RLS) in online cases. These linear estimation algorithms are the basis of kernel adaptive filters. [ACCEPTED... in red. the observation signal yt using kernels and an LMS-based update rule; see [41]. Kernel State-Space Model (KSSM): The adaptive version of the proposed method, where the predictions are gener- ated by propagating the particles of the state according...

  18. On admissible memory kernels for random unitary qubit evolution

    E-Print Network [OSTI]

    Filip A. Wudarski; Pawe? Nale?yty; Gniewomir Sarbicki; Dariusz Chru?ci?ski

    2015-04-12

    We analyze random unitary evolution of the qubit within memory kernel approach. We provide su?cient conditions which guarantee that the corresponding memory kernel generates physically legitimate quantum evolution. Interestingly, we are able to recover several well known examples and generate new classes of nontrivial qubit evolution. Surprisingly, it turns out that quantum evolution with memory kernel generated by our approach gives rise to vanishing non-Markovianity measure based on the distinguishability of quantum states.

  19. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  20. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  1. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  2. Shadow Kernels: A General Mechanism For Kernel Specialization in Existing Operating Systems

    E-Print Network [OSTI]

    Chick, Oliver R. A.; Carata, Lucian; Snee, James; Balakrishnan, Nikilesh; Sohan, Ripduman

    2015-01-01

    in systems such as Ar- rakis [13, 14]. Once a process is given ownership of a particular vir- tualized PCI device, the problem of “routing” asynch- ronous tasks towards executing a given shadow kernel becomes solvable: All the code that is executed in ker...

  3. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  4. Impact Highlight: Partial Biological Control of Tarnished Plant Bug in New Hampshire

    E-Print Network [OSTI]

    New Hampshire, University of

    Impact Highlight: Partial Biological Control of Tarnished Plant Bug in New Hampshire Dr. Alan Eaton in New Hampshire rose. In the late 1970's, Dr. William Day of the USDA Beneficial Insects Research Lab in 1990, to get it established in New Hampshire. He made three releases in 1990 & 91, and the insect

  5. HOUSEHOLD AND STRUCTURAL INSECTS Accuracy of Trained Canines for Detecting Bed Bugs (Hemiptera

    E-Print Network [OSTI]

    Wang, Changlu

    HOUSEHOLD AND STRUCTURAL INSECTS Accuracy of Trained Canines for Detecting Bed Bugs (Hemiptera) compared the effectiveness of visual inspection, passive pitfall-style interceptors, and active (with lure number of infestations was de- tected by passive pitfall-style monitors (70%) placed under the legs

  6. Finding and Understanding Bugs in C Compilers Xuejun Yang Yang Chen Eric Eide John Regehr

    E-Print Network [OSTI]

    Regehr, John

    Finding and Understanding Bugs in C Compilers Xuejun Yang Yang Chen Eric Eide John Regehr University of Utah, School of Computing { jxyang, chenyang, eeide, regehr }@cs.utah.edu Abstract Compilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test

  7. Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit-State

    E-Print Network [OSTI]

    Ernst, Michael

    during program execution, and HTML failures that occur when the application generates mal- formed HTML may be halted, depending on the severity of the failure. HTML failures occur when output is generatedFinding Bugs in Web Applications Using Dynamic Test Generation and Explicit-State Model Checking

  8. Phoenix: Detecting and Recovering from Permanent Processor Design Bugs with Programmable Hardware

    E-Print Network [OSTI]

    Torrellas, Josep

    Phoenix: Detecting and Recovering from Permanent Processor Design Bugs with Programmable Hardware, and Motorola processors, this paper proposes and evalu- ates Phoenix -- novel field-programmable on-chip hardware that de- tects and recovers from design defects. Phoenix taps key logic signals and, based

  9. A Systematic Study of Automated Program Repair: Fixing 55 out of 105 Bugs for $8 Each

    E-Print Network [OSTI]

    New Mexico, University of

    maintenance, which consumes a daunting fraction of the total cost of software production [1]. AutomatedA Systematic Study of Automated Program Repair: Fixing 55 out of 105 Bugs for $8 Each Claire Le-source programs totaling 5.1 million lines of code and involving 10,193 test cases. GenProg automatically repairs

  10. Structured Linux Kernel Projects for Teaching Operating Systems Concepts

    E-Print Network [OSTI]

    Laadan, Oren

    Structured Linux Kernel Projects for Teaching Operating Systems Concepts Oren Laadan Dept of a complex, production operating system can be a challenge. We present a structured series of five Linux kernel programming projects suitable for a one semester introductory operating systems course to address

  11. GILK: A dynamic instrumentation tool for the Linux Kernel

    E-Print Network [OSTI]

    Pearce, David J.

    GILK: A dynamic instrumentation tool for the Linux Kernel A. Nonymous, B. Nonymous, C.Nonymous No Institute Given Abstract. This document describes a novel instrumentation tool for the Linux Kernel function, and insert user-speci#12;ed instrumentation before or after any basic block. The instruments

  12. A Heat Kernel based Cortical Thickness Estimation Algorithm

    E-Print Network [OSTI]

    Wang, Yalin

    thickness, Heat Kernel, Tetrahedral Mesh, Streamline, False Discovery Rate 1 Introduction AlzheimerA Heat Kernel based Cortical Thickness Estimation Algorithm Gang Wang1,2 , Xiaofeng Zhang1.R.China Abstract. Cortical thickness estimation in magnetic resonance imag- ing (MRI) is an important technique

  13. Quantile Regression with 1-regularization and Gaussian Kernels

    E-Print Network [OSTI]

    Quantile Regression with 1-regularization and Gaussian Kernels Lei Shi1,2 , Xiaolin Huang1 , Zheng Sciences, Fudan University Shanghai 200433, P. R. China Abstract The quantile regression problem of 1-quantile regression with Gaussian kernels is almost the same as that of the RKHS-based learning

  14. Using the Equivalent Kernel to Understand Gaussian Process Regression

    E-Print Network [OSTI]

    Sollich, Peter

    Using the Equivalent Kernel to Understand Gaussian Process Regression Peter Sollich Dept.k.i.williams@ed.ac.uk Abstract The equivalent kernel [1] is a way of understanding how Gaussian pro­ cess regression works processes. Consider the supervised regression problem for a dataset D with entries (x i ; y i ) for i = 1

  15. Using the Equivalent Kernel to Understand Gaussian Process Regression

    E-Print Network [OSTI]

    Sollich, Peter

    Using the Equivalent Kernel to Understand Gaussian Process Regression Peter Sollich Dept.k.i.williams@ed.ac.uk Abstract The equivalent kernel [1] is a way of understanding how Gaussian pro- cess regression works processes. Consider the supervised regression problem for a dataset D with entries (xi, yi) for i = 1

  16. HEAT KERNEL AND GREEN FUNCTION ESTIMATES ON NONCOMPACT SYMMETRIC SPACES

    E-Print Network [OSTI]

    Ji, Lizhen

    HEAT KERNEL AND GREEN FUNCTION ESTIMATES ON NONCOMPACT SYMMETRIC12, 43A80, 43A85, * *43A90, 58G11. Key words and phrases. Green function, heat kernel, Iwasawa effi* *ciently to pro- duce sharp and complete results comparable to the Euclidean or the compact case

  17. Mach Kernel Monitor (with applications using the PIE environment)

    E-Print Network [OSTI]

    Mach Kernel Monitor (with applications using the PIE environment) 23 August 1990 Ted Lehr David. Special examples of data obtained by using MKM are shown via the PIE performance monitoring environment programs are scheduled. This manual describes how to use MKM, the Mach (context­switch) kernel monitor

  18. FRAME BASED KERNEL METHODS FOR AUTOMATIC CLASSIFICATION IN HYPERSPECTRAL DATA

    E-Print Network [OSTI]

    Hirn, Matthew

    FRAME BASED KERNEL METHODS FOR AUTOMATIC CLASSIFICATION IN HYPERSPECTRAL DATA John J. Benedetto, instead of (orthonormal) bases. Our frames are data-dependent and are based on endmember demixing schemes propose a new kernel and frame based dimension reduc- ing algorithm by exploiting the synergy between

  19. OSKI: A Library of Automatically Tuned Sparse Matrix Kernels

    E-Print Network [OSTI]

    California at Berkeley, University of

    OSKI: A Library of Automatically Tuned Sparse Matrix Kernels Richard Vuduc (LLNL), James Demmel in progress · Written in C (can call from Fortran) #12;Motivation: The Difficulty of Tuning · n = 21216 · nnz data structures ­ Step 2: Make BLAS-like kernel calls int* ptr = ..., *ind = ...; double* val

  20. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  1. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  2. Establishing and Implementing an IPM Program for the Redbanded Stink Bug: An Emerging Soybean Pest in the Southern Region 

    E-Print Network [OSTI]

    Vyavhare, Suhas

    2014-08-04

    Redbanded stink bug (RBSB), (Piezodorus guildinii Westwood) has recently emerged as an economic pest of soybean, Glycine max (L.) Merrill in the southern US. Having only recently emerged as a pest in the US, little information ...

  3. The Dynamical Kernel Scheduler - Part 1

    E-Print Network [OSTI]

    Adelmann, Andreas; Suter, Andreas

    2015-01-01

    Emerging processor architectures such as GPUs and Intel MICs provide a huge performance potential for high performance computing. However developing software using these hardware accelerators introduces additional challenges for the developer such as exposing additional parallelism, dealing with different hardware designs and using multiple development frameworks in order to use devices from different vendors. The Dynamic Kernel Scheduler (DKS) is being developed in order to provide a software layer between host application and different hardware accelerators. DKS handles the communication between the host and device, schedules task execution, and provides a library of built-in algorithms. Algorithms available in the DKS library will be written in CUDA, OpenCL and OpenMP. Depending on the available hardware, the DKS can select the appropriate implementation of the algorithm. The first DKS version was created using CUDA for the Nvidia GPUs and OpenMP for Intel MIC. DKS was further integrated in OPAL (Object-or...

  4. Initial-state splitting kernels in cold nuclear matter

    E-Print Network [OSTI]

    Ovanesyan, Grigory; Vitev, Ivan

    2015-01-01

    We derive medium-induced splitting kernels for energetic partons that undergo interactions in dense QCD matter before a hard-scattering event at large momentum transfer $Q^2$. Working in the framework of the effective theory ${\\rm SCET}_{\\rm G}\\,$, we compute the splitting kernels beyond the soft gluon approximation. We present numerical studies that compare our new results with previous findings. We expect the full medium-induced splitting kernels to be most relevant for the extension of initial-state cold nuclear matter energy loss phenomenology in both p+A and A+A collisions.

  5. Implementation of a parallel multilevel secure process. Master's thesis

    SciTech Connect (OSTI)

    Pratt, D.R.

    1988-06-01

    This thesis demonstrates an implementation of a parallel multilevel secure process. This is done within the framework of an electronic-mail system. Security is implemented by GEMSOS, the operating system of the Gemini Trusted Computer Base. A brief history of computer secrecy is followed by a discussion of security kernels. Event counts and sequences are used to provide concurrency control and are covered in detail. The specifications for the system are based upon the requirements for a Headquarters of a hypothetical Marine Battalion in garrison.

  6. Many Molecular Properties from One Kernel in Chemical Space

    E-Print Network [OSTI]

    Ramakrishnan, Raghunathan

    2015-01-01

    We introduce property-independent kernels for machine learning modeling of arbitrarily many molecular properties. The kernels encode molecular structures for training sets of varying size, as well as similarity measures sufficiently diffuse in chemical space to sample over all training molecules. Corresponding molecular reference properties provided, they enable the instantaneous generation of ML models which can systematically be improved through the addition of more data. This idea is exemplified for single kernel based modeling of internal energy, enthalpy, free energy, heat capacity, polarizability, electronic spread, zero-point vibrational energy, energies of frontier orbitals, HOMO-LUMO gap, and the highest fundamental vibrational wavenumber. Models of these properties are trained and tested using 112 kilo organic molecules of similar size. Resulting models are discussed as well as the kernels' use for generating and using other property models.

  7. RECIPES FOR CLASSICAL KERNEL FUNCTIONS ASSOCIATED TO A

    E-Print Network [OSTI]

    RECIPES FOR CLASSICAL KERNEL FUNCTIONS ASSOCIATED TO A MULTIPLY CONNECTED DOMAIN IN THE PLANE elementary functions that are easy to compute. I shall also give a recipe to compute the functions

  8. Efficient graphlet kernels for large graph comparison Nino Shervashidze

    E-Print Network [OSTI]

    Mehlhorn, Kurt

    Efficient graphlet kernels for large graph comparison Nino Shervashidze MPI for Biological such as gSpan (Yan & Han, 2003) have been developed for this task, which use el- egant data structures

  9. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  10. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  11. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  12. Example of computation in R and Bugs We illustrate some of the practical issues of simulation by fitting a single This

    E-Print Network [OSTI]

    Gelman, Andrew

    the general statistical package R. We proceed from data input, through statistical inference, to posterior in Bugs. Section C.4 presents several different ways of programming the model directly in RAPPENDIX C Example of computation in R and Bugs We illustrate some of the practical issues

  13. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  14. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  15. On flame kernel formation and propagation in premixed gases

    SciTech Connect (OSTI)

    Eisazadeh-Far, Kian; Metghalchi, Hameed [Northeastern University, Mechanical and Industrial Engineering Department, Boston, MA 02115 (United States); Parsinejad, Farzan [Chevron Oronite Company LLC, Richmond, CA 94801 (United States); Keck, James C. [Massachusetts Institute of Technology, Cambridge, MA 02139 (United States)

    2010-12-15

    Flame kernel formation and propagation in premixed gases have been studied experimentally and theoretically. The experiments have been carried out at constant pressure and temperature in a constant volume vessel located in a high speed shadowgraph system. The formation and propagation of the hot plasma kernel has been simulated for inert gas mixtures using a thermodynamic model. The effects of various parameters including the discharge energy, radiation losses, initial temperature and initial volume of the plasma have been studied in detail. The experiments have been extended to flame kernel formation and propagation of methane/air mixtures. The effect of energy terms including spark energy, chemical energy and energy losses on flame kernel formation and propagation have been investigated. The inputs for this model are the initial conditions of the mixture and experimental data for flame radii. It is concluded that these are the most important parameters effecting plasma kernel growth. The results of laminar burning speeds have been compared with previously published results and are in good agreement. (author)

  16. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  17. Future Trends in Secure Chip Data Management Nicolas Anciaux, Luc Bouganim and Philippe Pucheral

    E-Print Network [OSTI]

    of scaling down database techniques for the smart card and proposed the design of a DBMS kernel called PicoDBMS. This paper summarizes the learning obtained during an extensive performance analysis of PicoDBMS. Then it studies to which extent secure chips hardware evolution should impact the design of embedded data

  18. T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information

    Broader source: Energy.gov [DOE]

    A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space.

  19. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  20. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  1. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  2. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOS Bugs Let

  3. Dirichlet integral dual-access collocation-kernel space analytic interpolation for unit disks: DIDACKS I

    E-Print Network [OSTI]

    Alan Rufty

    2007-02-17

    This article presents a technique for analytic interpolation over the exterior of a unit disk using complex poles in the interior--as well as corresponding techniques for the exterior of a real unit disk and for the interior of a real and complex unit disk. This is accomplished by developing special kernel spaces labeled dual-access collocation-kernel spaces. Higher order pole and logarithmic point source kernels are also considered. Relationships to Szego and Bergman kernel theory are addressed.

  4. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  7. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  8. Convex Deep Learning via Normalized Kernels Ozlem Aslan

    E-Print Network [OSTI]

    Schuurmans, Dale

    Convex Deep Learning via Normalized Kernels ¨Ozlem Aslan Dept of Computing Science University Deep learning has been a long standing pursuit in machine learning, which until recently was hampered meth- ods while expanding the range of representable structures toward deep models. In this paper, we

  9. Column-Generation Boosting Methods for Mixture of Kernels

    E-Print Network [OSTI]

    Chandy, John A.

    Column-Generation Boosting Methods for Mixture of Kernels Jinbo Bi Computer-Aided Diagnosis approach to classification and regres- sion based on column generation using a mixture of ker- nels logistic regression, etc. The idea is to map data into Permission to make digital or hard copies of all

  10. Modifying Kernels Using Label Information Improves SVM Classification Performance

    E-Print Network [OSTI]

    Toronto, University of

    , we solve protein remote homology detec- tion problem and handwritten digit classification problem digit classification and two mismatch-string kernels as base ker- nels [6] for protein classification. We present our experi- mental results for digit classification and protein homology detection

  11. PERI - Auto-tuning Memory Intensive Kernels for Multicore

    SciTech Connect (OSTI)

    Bailey, David H; Williams, Samuel; Datta, Kaushik; Carter, Jonathan; Oliker, Leonid; Shalf, John; Yelick, Katherine; Bailey, David H

    2008-06-24

    We present an auto-tuning approach to optimize application performance on emerging multicore architectures. The methodology extends the idea of search-based performance optimizations, popular in linear algebra and FFT libraries, to application-specific computational kernels. Our work applies this strategy to Sparse Matrix Vector Multiplication (SpMV), the explicit heat equation PDE on a regular grid (Stencil), and a lattice Boltzmann application (LBMHD). We explore one of the broadest sets of multicore architectures in the HPC literature, including the Intel Xeon Clovertown, AMD Opteron Barcelona, Sun Victoria Falls, and the Sony-Toshiba-IBM (STI) Cell. Rather than hand-tuning each kernel for each system, we develop a code generator for each kernel that allows us to identify a highly optimized version for each platform, while amortizing the human programming effort. Results show that our auto-tuned kernel applications often achieve a better than 4X improvement compared with the original code. Additionally, we analyze a Roofline performance model for each platform to reveal hardware bottlenecks and software challenges for future multicore systems and applications.

  12. Kernel Regression with Correlated Errors K. De Brabanter

    E-Print Network [OSTI]

    Kernel Regression with Correlated Errors K. De Brabanter , J. De Brabanter , , J.A.K. Suykens B: It is a well-known problem that obtaining a correct bandwidth in nonparametric regression is difficult support vector machines for regression. Keywords: nonparametric regression, correlated errors, short

  13. Measurement Denoising Using Kernel Adaptive Filters in the Smart Grid

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    Measurement Denoising Using Kernel Adaptive Filters in the Smart Grid Zhe Chen and Robert C. Qiu@ieee.org, rqiu@tntech.edu Abstract--State estimation plays an important role in the smart grid. Conventionally, noisy measurements are directly used for state estimation. Today, in the context of the smart grid

  14. Improving the Energy Efficiency of the MANTIS Kernel

    E-Print Network [OSTI]

    Sreenan, Cormac J.

    Improving the Energy Efficiency of the MANTIS Kernel Cormac Duffy1 , Utz Roedig2 , John Herbert1. The event-based TinyOS is more energy efficient than the multi-threaded MANTIS system. However, MANTIS, timeliness can be traded for energy efficiency by choosing the appropriate operating system. In this paper we

  15. ASYMPTOTIC PROPERTIES OF THE HEAT KERNEL ON CONIC MANIFOLDS

    E-Print Network [OSTI]

    Loya, Paul

    ASYMPTOTIC PROPERTIES OF THE HEAT KERNEL ON CONIC MANIFOLDS PAUL LOYA Abstract. We derive Foundation Fellowship. 1 #12; 2 PAUL LOYA Trace expansions of cone operators has a long history stemming from on conic manifolds; see for instance, Callias [5], Cheeger [7], Chou [9], BrË?uning--Seeley [3], Br

  16. Kernel spectral clustering for predicting maintenance of industrial machines

    E-Print Network [OSTI]

    status, but the operations are labor inten- sive and prone to human errors. Condition-based maintenance monitoring of machine parts leads to reliable and accurate lifetime predictions, and maintenance operationsKernel spectral clustering for predicting maintenance of industrial machines Rocco Langone1, Carlos

  17. Optical transformation from chirplet to fractional Fourier transformation kernel

    E-Print Network [OSTI]

    Hong-yi Fan; Li-yun Hu

    2009-02-11

    We find a new integration transformation which can convert a chirplet function to fractional Fourier transformation kernel, this new transformation is invertible and obeys Parseval theorem. Under this transformation a new relationship between a phase space function and its Weyl-Wigner quantum correspondence operator is revealed.

  18. A Forced Sampled Execution Approach to Kernel Rootkit Identification

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    }@symantec.com Abstract. Kernel rootkits are considered one of the most dangerous forms of malware because they reside a forced sampled execution approach to traverse the driver's control flow graph. Through a comprehensive, 11, 4] is a piece of binary code that a computer in- truder, after breaking into a machine, installs

  19. A Kernel Method for Market Clearing Sebastien Lahaie

    E-Print Network [OSTI]

    Sandholm, Tuomas W.

    linear prices do not suffice. We first present a procedure that, given a sample of values and costs nonlinear clearing prices with much less than full revelation of values and costs. When the kernel function that, given a sample of values and costs for a set of bundles, computes nonlinear clearing prices using

  20. 30/07/2011 00:22Exploding Bacteria, Self-Fertilizing Bugs and Other Cool Critters -Ecocentric -TIME.com Page 1 of 5http://ecocentric.blogs.time.com/2011/07/29/exploding-bacteria-self-fertilizing-bugs-and-other-cool-critters/

    E-Print Network [OSTI]

    Obbard, Darren

    30/07/2011 00:22Exploding Bacteria, Self-Fertilizing Bugs and Other Cool Critters - Ecocentric - TIME.com Page 1 of 5http://ecocentric.blogs.time.com/2011/07/29/exploding-bacteria for Obama on Auto Efficiency Exploding Bacteria, Self-Fertilizing Bugs and Other Cool Critters Add a Comment

  1. Brownian bugs and superprocesses Scripps Institution of Oceanography, University of California at San Diego, La Jolla 92093-0213

    E-Print Network [OSTI]

    Cambridge, University of

    Brownian bugs and superprocesses W.R. Young Scripps Institution of Oceanography, University physical oceanog- raphy and biological oceanography. These models, which describe biology using continuous for copepods, but not for whales. In oceanography, adr models are a main line of com- munication between

  2. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  3. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  4. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  5. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  9. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  11. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  12. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  13. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  14. Memory Kernel in the Expertise of Chess Players

    E-Print Network [OSTI]

    Schaigorodsky, Ana L; Billoni, Orlando V

    2015-01-01

    In this work we investigate a mechanism for the emergence of long-range time correlations observed in a chronologically ordered database of chess games. We analyze a modified Yule-Simon preferential growth process proposed by Cattuto et al., which includes memory effects by means of a probabilistic kernel. According to the Hurst exponent of different constructed time series from the record of games, artificially generated databases from the model exhibit similar long-range correlations. In addition, the inter-event time frequency distribution is well reproduced by the model for realistic parameter values. In particular, we find the inter-event time distribution properties to be correlated with the expertise of the chess players through the memory kernel extension. Our work provides new information about the strategies implemented by players with different levels of expertise, showing an interesting example of how popularities and long-range correlations build together during a collective learning process.

  15. Positive curvature property for some hypoelliptic heat kernels

    E-Print Network [OSTI]

    Qian, Bin

    2010-01-01

    In this note, we look at some hypoelliptic operators arising from nilpotent rank 2 Lie algebras. In particular, we concentrate on the diffusion generated by three Brownian motions and their three L\\'evy areas, which is the simplest extension of the Laplacian on the Heisenberg group $\\mathbb{H}$. In order to study contraction properties of the heat kernel, we show that, as in the case of the Heisenberg group, the restriction of the sub-Laplace operator acting on radial functions (which are defined in some precise way in the core of the paper) satisfies a non negative Ricci curvature condition (more precisely a $CD(0, \\infty)$ inequality), whereas the operator itself does not satisfy any $CD(r,\\infty)$ inequality. From this we may deduce some useful, sharp gradient bounds for the associated heat kernel.

  16. Multi-level security for computer networking: SAC digital network approach

    SciTech Connect (OSTI)

    Griess, W.; Poutre, D.L.

    1983-10-01

    For telecommunications systems simultaneously handling data of different security levels, multilevel secure (MLS) operation permits maximum use of resources by automatically providing protection to users with various clearances and needs-to-know. The strategic air command (SAC) is upgrading the primary record data system used to command and control its strategic forces. The upgrade, called the SAC Digital Network (SACDIN), is designed to provide multilevel security to support users and external interfaces, with allowed accesses ranging from unclassified to top secret. SACDIN implements a security kernel based upon the Bell and Lapadula security model. This study presents an overview of the SACDIN security architecture and describes the basic message flow across the MLS network. 7 references.

  17. Kernel Regression For Determining Photometric Redshifts From Sloan Broadband Photometry

    E-Print Network [OSTI]

    D. Wang; Y. X. Zhang; C. Liu; Y. H. Zhao

    2007-06-20

    We present a new approach, kernel regression, to determine photometric redshifts for 399,929 galaxies in the Fifth Data Release of the Sloan Digital Sky Survey (SDSS). In our case, kernel regression is a weighted average of spectral redshifts of the neighbors for a query point, where higher weights are associated with points that are closer to the query point. One important design decision when using kernel regression is the choice of the bandwidth. We apply 10-fold cross-validation to choose the optimal bandwidth, which is obtained as the cross-validation error approaches the minimum. The experiments show that the optimal bandwidth is different for diverse input patterns, the least rms error of photometric redshift estimation arrives at 0.019 using color+eClass as the inputs, the less rms error amounts to 0.020 using ugriz+eClass as the inputs. Here eClass is a galaxy spectra type. Then the little rms scatter is 0.021 with color+r as the inputs.

  18. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  19. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  1. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  2. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  3. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  4. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  5. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  6. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  7. A high-order fast method for computing convolution integral with smooth kernel

    E-Print Network [OSTI]

    Qiang, Ji

    2010-01-01

    of the convolution integral. The downside of these evenfor computing convolution integral with smooth kernel Jicalculate convolution integral with smooth non-periodic

  8. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  9. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  12. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  13. Kernel regression estimates of time delays between gravitationally lensed fluxes

    E-Print Network [OSTI]

    Otaibi, Sultanah AL; Cuevas-Tello, Juan C; Mandel, Ilya; Raychaudhury, Somak

    2015-01-01

    Strongly lensed variable quasars can serve as precise cosmological probes, provided that time delays between the image fluxes can be accurately measured. A number of methods have been proposed to address this problem. In this paper, we explore in detail a new approach based on kernel regression estimates, which is able to estimate a single time delay given several datasets for the same quasar. We develop realistic artificial data sets in order to carry out controlled experiments to test of performance of this new approach. We also test our method on real data from strongly lensed quasar Q0957+561 and compare our estimates against existing results.

  14. Functional inverse regression and reproducing kernel Hilbert space 

    E-Print Network [OSTI]

    Ren, Haobo

    2006-10-30

    and Reproducing Kernel Hilbert Space. (August 2005) Haobo Ren, B.S., Peking University; M.S., Peking University Chair of Advisory Committee: Dr. Tailen Hsing The basic philosophy of Functional Data Analysis (FDA) is to think of the observed data functions... component analysis of ? . Duan and Li (1991) and Li (1997) presented more delicate results for analyzing single- index regression by SIR, Hsing and Carroll (1992) and Zhu and Ng (1995) derived the large sample properties of SIR based on ?-delta, Chen and Li...

  15. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  16. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  17. Parameter-insensitive kernel in extreme learning for non-linear support vector regression

    E-Print Network [OSTI]

    Verleysen, Michel

    Parameter-insensitive kernel in extreme learning for non-linear support vector regression Beno Available online 12 May 2011 Keywords: Extreme learning machine Support vector regression ELM kernel Infinite number of neurons a b s t r a c t Support vector regression (SVR) is a state-of-the-art method

  18. ccsd-00085858,version1-16Jul2006 SUPERCONNECTION AND FAMILY BERGMAN KERNELS

    E-Print Network [OSTI]

    Boyer, Edmond

    ccsd-00085858,version1-16Jul2006 SUPERCONNECTION AND FAMILY BERGMAN KERNELS XIAONAN MA AND WEIPING is to use the superconnection as in the local family index theorem. Superconnexion et noyaux de Bergman en;SUPERCONNECTION AND FAMILY BERGMAN KERNELS 3 Let T 2 (T RW) TRX be the tensor defined in the following way

  19. Differentially Private Learning with Kernels Prateek Jain prajain@microsoft.com

    E-Print Network [OSTI]

    Rajamani, Sriram K.

    framework for differ- entially private regularized empirical risk minimization (ERM) that guarantees privacy. Chaudhuri et al. (2011) and Rubinstein et al. (2009) briefly looked at kernel ERMS where the dimensionality, we study the problem of differentially private learning using kernel ERM (kERM), where ac- cess

  20. Supplemental Material for "Classifying Video with Kernel Dynamic Antoni B. Chan and Nuno Vasconcelos

    E-Print Network [OSTI]

    Vasconcelos, Nuno M.

    Supplemental Material for "Classifying Video with Kernel Dynamic Textures" Antoni B. Chan and Nuno Vasconcelos SVCL-TR 2007/03 April 2007 #12;#12;Supplemental Material for "Classifying Video with Kernel This is the supplemental material for "Classifying Video with Dynamic Textures" [1]. It contains information about

  1. Kernel Level Energy-Efficient 3G Background Traffic Shaper for Android Smartphones

    E-Print Network [OSTI]

    Kernel Level Energy-Efficient 3G Background Traffic Shaper for Android Smartphones Ekhiotz Jon the Android platform, and measures its energy footprint. The total energy savings of our implementation range study. Index Terms--transmission energy; 3G; kernel; Android I. INTRODUCTION Mobile users have been

  2. JKernelMachines: A Simple Framework for Kernel Machines David Picard PICARD@ENSEA.FR

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . Description of the Library The backbone of the library is the definition of data types and kernels. In order to use any type of input space, the library makes heavy use o, France Editor: Abstract JKernelMachines is a Java library for learning with kernels. It is primarily

  3. Kernel de Tiempo Real para Control de Procesos Oscar Miranda Gomez, Pedro Mejia Alvarez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    ´afico de simulaci´on de tareas de tiempo real. El Kernel de Tiempo Real es peque~no (de tama~no 20.5Kb) y procesador y un peque~no sistema operativo empotrado el cual es capaz de controlar todo el hardware de manera de tiempo real el principal compo- nente lo constituye el sistema operativo o Kernel. Un sistema

  4. A GEOMETRIC CHARACTERIZATION: COMPLEX ELLIPSOIDS AND THE BOCHNER-MARTINELLI KERNEL

    E-Print Network [OSTI]

    Bolt, Michael

    A GEOMETRIC CHARACTERIZATION: COMPLEX ELLIPSOIDS AND THE BOCHNER-MARTINELLI KERNEL MICHAEL BOLT;2 MICHAEL BOLT Theorem 1 follows from an analogous characterization of real ellipsoids. The following-Fantappi`e kernel that is constructed using supporting hyperplanes. Theorem 2. For a strictly convex domain Cn

  5. HW Componentizing Kernel: A New Approach to address the Mega Complexity of Future Automotive CPS

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    HW Componentizing Kernel: A New Approach to address the Mega Complexity of Future Automotive CPS of CPS (Cyber Physical System). However, current software development process in the automotive industry automotive software devel- opment process in the perspective of CPS and proposes a new kernel-based approach

  6. Comparing Kernels For Predicting Protein Binding Sites From Amino Acid Sequence

    E-Print Network [OSTI]

    Honavar, Vasant

    in on all three tasks, with the substitution kernel based on amino acid substitution matrices that take into account structural or evolutionary conservation or physicochemical properties of amino acids yields modestComparing Kernels For Predicting Protein Binding Sites From Amino Acid Sequence Feihong Wu1

  7. Jumping Neptune Can Explain the Kuiper Belt Kernel

    E-Print Network [OSTI]

    Nesvorny, David

    2015-01-01

    The Kuiper belt is a population of icy bodies beyond the orbit of Neptune. A particularly puzzling and up-to-now unexplained feature of the Kuiper belt is the so-called `kernel', a concentration of orbits with semimajor axes a~44 AU, eccentricities e~0.05, and inclinations ibelt kernel can be explained if Neptune's otherwise smooth migration was interrupted by a discontinuous change of Neptune's semimajor axis when Neptune reached ~28 AU. Before the discontinuity happened, planetesimals located at ~40 AU were swept into Neptune's 2:1 resonance, and were carried with the migrating resonance outwards. The 2:1 resonance was at ~44 AU when Neptune reached ~28 AU. If Neptune's semimajor axis changed by fraction of AU at this point, perhaps because Neptune was scattered off of another planet, the 2:1 population would have been released at ~44 AU, and would remain there to this day. We show that the orbital distribution of bodies produced in this model provides a good match to...

  8. TORCH Computational Reference Kernels - A Testbed for Computer Science Research

    SciTech Connect (OSTI)

    Kaiser, Alex; Williams, Samuel Webb; Madduri, Kamesh; Ibrahim, Khaled; Bailey, David H.; Demmel, James W.; Strohmaier, Erich

    2010-12-02

    For decades, computer scientists have sought guidance on how to evolve architectures, languages, and programming models in order to improve application performance, efficiency, and productivity. Unfortunately, without overarching advice about future directions in these areas, individual guidance is inferred from the existing software/hardware ecosystem, and each discipline often conducts their research independently assuming all other technologies remain fixed. In today's rapidly evolving world of on-chip parallelism, isolated and iterative improvements to performance may miss superior solutions in the same way gradient descent optimization techniques may get stuck in local minima. To combat this, we present TORCH: A Testbed for Optimization ResearCH. These computational reference kernels define the core problems of interest in scientific computing without mandating a specific language, algorithm, programming model, or implementation. To compliment the kernel (problem) definitions, we provide a set of algorithmically-expressed verification tests that can be used to verify a hardware/software co-designed solution produces an acceptable answer. Finally, to provide some illumination as to how researchers have implemented solutions to these problems in the past, we provide a set of reference implementations in C and MATLAB.

  9. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  10. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  11. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  12. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  13. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  14. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  15. Phylogeny and Niche Conservatism in North and Central American Triatomine Bugs (Hemiptera: Reduviidae: Triatominae), Vectors of Chagas' Disease

    E-Print Network [OSTI]

    Ibarra-Cerdeñ a, Carlos N.; Zaldivar-Riveron, Alejandro; Peterson, A. Townsend; Sá nchez-Cordero, Ví ctor; Ramsey, Janine M.

    2014-10-30

    ´nchez- Cordero2, Janine M. Ramsey4* 1 Departamento de Ecolog?´a Humana, Centro de Investigacio´n y de Estudios Avanzados del IPN (Cinvestav), Unidad Me´rida, Me´rida, Yucata´n, Me´xico, 2 Departamento de Zoolog?´a, Instituto de Biolog?´a, UNAM, Me´xico DF, Me... movements, expansion of transportation networks and climate change scenarios. Citation: Ibarra-Cerden˜a CN, Zald?´var-Rivero´n A, Peterson AT, Sa´nchez-Cordero V, Ramsey JM (2014) Phylogeny and Niche Conservatism in North and Central American Triatomine Bugs...

  16. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Environmental Management (EM)

    were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT ASSESSMENT: Medium DISCUSSION: A...

  17. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  18. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  19. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  20. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  1. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  2. Collision kernels from velocity-selective optical pumping with magnetic depolarization

    E-Print Network [OSTI]

    Bhamre, T.

    We experimentally demonstrate how magnetic depolarization of velocity-selective optical pumping can be used to single out the collisional cusp kernel best describing spin- and velocity-relaxing collisions between potassium ...

  3. A Gaussian-Like Immersed Boundary Kernel with Improved Translational Invariance and Smoothness

    E-Print Network [OSTI]

    Bao, Yuan-Xun; Peskin, Charles S

    2015-01-01

    The immersed boundary (IB) method is a general mathematical framework for studying problems involving fluid-structure interactions in which an elastic structure is immersed in a viscous incompressible fluid. In the IB formulation, the fluid described by Eulerian variables is coupled with the immersed structure described by Lagrangian variables via the use of the Dirac delta function. From a numerical standpoint, the Lagrangian force spreading and the Eulerian velocity interpolation are carried out by a regularized, compactly supported discrete delta function or kernel. Immersed-boundary kernels are derived from a certain set of postulates to achieve approximate grid translational invariance, interpolation accuracy and computational efficiency. In this note, we present a new 6-point immersed-boundary kernel that is $\\mathcal{C}^3$ and features a substantially improved translational invariance compared to other common IB kernels.

  4. CPM: A Graph Pattern Matching Kernel with Diffusion for Accurate Graph Classification

    E-Print Network [OSTI]

    Kansas, University of

    (the Molecular Library Initiative project) that aims to determine and publicize the biological activ chemical structure data sets and have compared our methods to all major graph kernel functions that we know

  5. Weighted Bergman Kernel Functions and the Lu Qi-keng Problem 

    E-Print Network [OSTI]

    Jacobson, Robert Lawrence

    2012-07-16

    The classical Lu Qi-keng Conjecture asks whether the Bergman kernel function for every domain is zero free. The answer is no, and several counterexamples exist in the literature. However, the more general Lu Qi-keng Problem, ...

  6. Protein fold recognition by alignment of amino acid residues using kernelized dynamic time warping

    E-Print Network [OSTI]

    Protein fold recognition by alignment of amino acid residues using kernelized dynamic time warping distances between proteins. This method shows significant improvement in protein fold recognition. Overall March 2014 Keywords: Protein sequence Fold recognition Alignment method Feature extraction

  7. CLASSIFICATION OF FOOD KERNELS WITH IMPACT ACOUSTICS TIME-1 FREQUENCY PATTERNS2

    E-Print Network [OSTI]

    Minnesota, University of

    , Classification.24 25 INTRODUCTION26 Food kernel damage caused by insects, fungi and mold are major sources degrades the quality and value of wheat and is one of the most difficult29 #12;2 defects to detect

  8. Effects of ozone on the common bed bug (Cimex lectularius) James Feston, Marissa McDonough, Linda Mason, Timothy Gibb, Kurt Saltzmann

    E-Print Network [OSTI]

    Ginzel, Matthew

    Effects of ozone on the common bed bug (Cimex lectularius) James Feston, Marissa McDonough, Linda of ozone in stored maize. Journal of Stored Products Research 37(4): 371-382. McDonough, M., Mason, L., Woloshuk, C. 2011. Susceptibility of stored product insects to high concentrations of ozone at different

  9. Got the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores to university cafeterias, more retailers are showcasing food

    E-Print Network [OSTI]

    Debinski, Diane M.

    Got the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores to university cafeterias, more retailers are showcasing food grown and raised by local farmers and ranchers retailers develop local food connections. Below is a list of some of just some of the many USDA resources

  10. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  11. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  12. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  13. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  14. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  15. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  16. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  17. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  18. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  19. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  20. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  1. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  2. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  3. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  4. Approximate l-fold cross-validation with Least Squares SVM and Kernel Ridge Regression

    SciTech Connect (OSTI)

    Edwards, Richard E [ORNL] [ORNL; Zhang, Hao [ORNL] [ORNL; Parker, Lynne Edwards [ORNL] [ORNL; New, Joshua Ryan [ORNL] [ORNL

    2013-01-01

    Kernel methods have difficulties scaling to large modern data sets. The scalability issues are based on computational and memory requirements for working with a large matrix. These requirements have been addressed over the years by using low-rank kernel approximations or by improving the solvers scalability. However, Least Squares Support VectorMachines (LS-SVM), a popular SVM variant, and Kernel Ridge Regression still have several scalability issues. In particular, the O(n^3) computational complexity for solving a single model, and the overall computational complexity associated with tuning hyperparameters are still major problems. We address these problems by introducing an O(n log n) approximate l-fold cross-validation method that uses a multi-level circulant matrix to approximate the kernel. In addition, we prove our algorithm s computational complexity and present empirical runtimes on data sets with approximately 1 million data points. We also validate our approximate method s effectiveness at selecting hyperparameters on real world and standard benchmark data sets. Lastly, we provide experimental results on using a multi-level circulant kernel approximation to solve LS-SVM problems with hyperparameters selected using our method.

  5. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  6. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  7. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  8. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  9. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  10. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  11. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  12. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  13. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  14. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  15. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  16. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  17. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  18. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  19. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  20. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  1. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  2. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  3. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  4. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  5. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  6. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  7. Optimization of Vertical and Horizontal Beamforming Kernels on the PowerPC G4 Processor with AltiVec Technology

    E-Print Network [OSTI]

    Cho, Young Hyun

    1 Optimization of Vertical and Horizontal Beamforming Kernels on the PowerPC G4 Processor with Alti-time on a Sun UltraSPARC II server with 16 333-MHz processors by utilizing the Visual Instruction Set (VIS beamforming kernels to use AltiVec SIMD extension for the PowerPC. AltiVec can execute up to four 32-bit

  8. Noise Kernel for Self-similar Tolman Bondi Metric: Fluctuations on Cauchy Horizon

    E-Print Network [OSTI]

    Seema Satin; Kinjalk Lochan; Sukratu Barve

    2013-04-12

    We attempt to calculate the point separated Noise Kernel for self similar Tolman Bondi metric, using a method similar to that developed by Eftekharzadeh et. al for ultra-static spacetimes referring to the work by Page. In case of formation of a naked singularity, the Noise Kernel thus obtained is found to be regular except on the Cauchy horizon, where it diverges. The behavior of the noise in case of the formation of a covered singularity is found to be regular. This result seemingly renders back reaction non-negligible which questions the stability of the results obtained from the semiclassical treatment of the self similar Tolman Bondi metric.

  9. Gene- or region-based association study via kernel principal component analysis

    E-Print Network [OSTI]

    Gao, Qingsong; He, Yungang; Yuan, Zhongshang; Zhao, Jinghua; Zhang, Bingbing; Xue, Fuzhong

    2011-08-26

    RJ, Zeiss C, Chew EY, Tsai JY, Sackler RS, Haynes C, Henning AK, SanGiovanni JP, Mane SM, Mayne ST, et al: Complement factor H polymorphism in age-related macular degeneration. Science 2005, 308(5720):385-389. 2. Maraganore DM, de Andrade M, Lesnick... information processing systems 1999, 11(1):536-542. 28. Schlkopf B, Smola A, Müller K: Kernel principal component analysis. Artificial Neural Networks¡ªICANN’97 1997, 583-588. 29. Scholkopf B, Smola A, Muller KR: Nonlinear component analysis as a kernel...

  10. Heat kernels on 2d Liouville quantum gravity: a numerical study

    E-Print Network [OSTI]

    Grigory Bonik; Joe P. Chen; Alexander Teplyaev

    2014-11-06

    We numerically compute the heat kernel on a square lattice torus equipped with the measure corresponding to Liouville quantum gravity (LQG). From the on-diagonal heat kernel we verify that the spectral dimension of LQG is 2. Furthermore, when diffusion is started from a high point of the underlying Gaussian free field, our numerics indicates superdiffusive space-time scaling with respect to the Euclidean metric in the small space-to-time regime. The implications of this result require further investigation, but seem to coincide with the notion that the Euclidean metric is not the right geodesic for characterizing the geometry of LQG.

  11. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  12. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  13. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  14. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  15. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  16. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  17. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  18. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  19. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  20. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  1. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  3. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  4. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  5. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  6. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  7. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  8. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  9. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  10. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  11. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  12. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  13. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  14. Gene Feature Extraction Using T-Test Statistics and Kernel Partial Least Squares

    E-Print Network [OSTI]

    Kwok, James Tin-Yau

    Gene Feature Extraction Using T-Test Statistics and Kernel Partial Least Squares Shutao Li1 , Chen Clear Water Bay, Hong Kong shutao li@yahoo.com.cn, lc337199@sina.com, jamesk@cs.ust.hk Abstract. In this paper, we propose a gene extraction method by us- ing two standard feature extraction methods, namely

  15. 3DString: A Feature String Kernel for 3D Object Classification on Voxelized Data

    E-Print Network [OSTI]

    Kriegel, Hans-Peter

    3DString: A Feature String Kernel for 3D Object Classification on Voxelized Data Johannes AÃ?falg-Maximilians-University Munich, Germany {assfalg|kb|kriegel}@dbs.ifi.lmu.de ABSTRACT Classification of 3D objects remains which allows to combine it with an M-tree for handling of large volumes of data. Classification

  16. Image Set Classification Using Holistic Multiple Order Statistics Features and Localized Multi-Kernel Metric Learning

    E-Print Network [OSTI]

    Moulin, Pierre

    Image Set Classification Using Holistic Multiple Order Statistics Features and Localized Multi-Kernel Metric Learning Jiwen Lu1 , Gang Wang1,2 , and Pierre Moulin3 1 Advanced Digital Sciences Center viewpoints or under varying illuminations. While a number of image set classification methods have been

  17. Structure of an Aspergillus flavus population from maize kernels in northern Italy Antonio Mauro a

    E-Print Network [OSTI]

    Cotty, Peter J.

    ; Piva et al., 2006). Aflatoxins are secondary metabolites produced by several mem- bers of AspergillusStructure of an Aspergillus flavus population from maize kernels in northern Italy Antonio Mauro, a Institute of Entomology and Plant Pathology, Università Cattolica del Sacro Cuore, Via Emilia Parmense 84

  18. AN EFFICIENT INTEGRAL TRANSFORM TECHNIQUE OF A SINGULAR WIRE ANTENNA KERNEL

    E-Print Network [OSTI]

    Park, Seong-Ook

    AN EFFICIENT INTEGRAL TRANSFORM TECHNIQUE OF A SINGULAR WIRE ANTENNA KERNEL S.-O. Park Department-348, South of Korea Abstract-This paper presents an efficient integral transform tech- nique for evaluating transforma- tions, the original double integral 1/-Rs with a singular kernal can be represented as a finite

  19. Integral operators with the generalized sine-kernel on the real axis

    E-Print Network [OSTI]

    N. A. Slavnov

    2010-05-27

    The asymptotic properties of integral operators with the generalized sine kernel acting on the real axis are studied. The formulas for the resolvent and the Fredholm determinant are obtained in the large x limit. Some applications of the results obtained to the theory of integrable models are considered.

  20. Predictable Interrupt Management for Real Time Kernels over conventional PC Hardware1

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    which this integrated model improves the traditional model. The design of a flexible and portable kernel-CONACyT 42151-Y, and CONACYT 42449-Y Mexico. Abstract In this paper we analyze the traditional model on real-time systems. As a result of this analysis, we propose a model that integrates interrupts

  1. Geotagged Photo Recognition using Corresponding Aerial Photos with Multiple Kernel Learning

    E-Print Network [OSTI]

    Yanai, Keiji

    Geotagged Photo Recognition using Corresponding Aerial Photos with Multiple Kernel Learning Keita for geotagged photos, we have already proposed ex- ploiting aerial photos around geotag places as addi- tional image features for visual recognition of geo- tagged photos. In the previous work, to fuse two kinds

  2. Optimizing Kernel Block Memory Operations Michael Calhoun, Scott Rixner, Alan L. Cox

    E-Print Network [OSTI]

    Optimizing Kernel Block Memory Operations Michael Calhoun, Scott Rixner, Alan L. Cox Rice University Houston, TX 77005 {calhoun,rixner,alc}@rice.edu Abstract-- This paper investigates the performance of block memory operations in the operating system, including memory copies, page zeroing, interprocess

  3. A Kernel-Based Spatio-Temporal Dynamical Model for Nowcasting Weather Radar Reflectivities

    E-Print Network [OSTI]

    A Kernel-Based Spatio-Temporal Dynamical Model for Nowcasting Weather Radar Reflectivities Ke Xu of the technique and its potential for nowcasting weather radar reflectivities. Key Words: Bayesian, dilation to nowcasting weather radar reflectivities into two general categories. The first is the use of simple

  4. A Unified Kernel Regression for Diffusion Wavelets on Manifolds Detects Aging-Related

    E-Print Network [OSTI]

    Chung, Moo K.

    for constructing wavelets on manifolds using a complicated machinery employed in previous studies [6,7]. Although as a solution to penalized regressions, which significantly differ from our framework that does not have any] that projects the statistical results to a surface for interpretation. 2 Kernel Regression and Wavelets

  5. Robust Kernel Density Estimation by Scaling and Projection in Hilbert Space

    E-Print Network [OSTI]

    Scott, Clayton

    Robust Kernel Density Estimation by Scaling and Projection in Hilbert Space Robert A. Vandermeulen is not straightforward and is a topic we explore in this paper. To construct a robust KDE we scale the traditional KDE and project it to its nearest weighted KDE in the L2 norm. This yields a scaled and projected KDE (SPKDE

  6. Supplemental Material for ``Classifying Video with Kernel Dynamic Antoni B. Chan and Nuno Vasconcelos

    E-Print Network [OSTI]

    Vasconcelos, Nuno M.

    Supplemental Material for ``Classifying Video with Kernel Dynamic Textures'' Antoni B. Chan and Nuno Vasconcelos SVCL­TR 2007/03 April 2007 #12; #12; Supplemental Material for ``Classifying Video This is the supplemental material for ``Classifying Video with Dynamic Textures'' [1]. It contains information about

  7. COMBINING FREE ENERGY SCORE SPACES WITH INFORMATION THEORETIC KERNELS: APPLICATION TO SCENE CLASSIFICATION

    E-Print Network [OSTI]

    Aguiar, Pedro M. Q.

    COMBINING FREE ENERGY SCORE SPACES WITH INFORMATION THEORETIC KERNELS: APPLICATION TO SCENE recent and top performing tools in each of the steps: (i) the free energy score space; (ii) non embeddings can be found in [1, 2, 13]. A very recent approach, termed free energy score space (FESS) [13, 14

  8. A FOOD IMAGE RECOGNITION SYSTEM WITH MULTIPLE KERNEL LEARNING Taichi Joutou and Keiji Yanai

    E-Print Network [OSTI]

    Yanai, Keiji

    A FOOD IMAGE RECOGNITION SYSTEM WITH MULTIPLE KERNEL LEARNING Taichi Joutou and Keiji Yanai 182-8585 JAPAN ABSTRACT Since health care on foods is drawing people's attention re- cently, a system that can record everyday meals easily is being awaited. In this paper, we propose an automatic food image

  9. SPEK: A Storage Performance Evaluation Kernel Module for Block Level Storage Systems under

    E-Print Network [OSTI]

    Yang, Qing "Ken"

    1 SPEK: A Storage Performance Evaluation Kernel Module for Block Level Storage Systems under Faulty), for evaluating the performance of block-level storage systems in the presence of faults as well as under normal operations. SPEK can work on both Direct Attached Storage (DAS) and block level networked storage systems

  10. SPEK: A Storage Performance Evaluation Kernel Module for Block Level Storage Systems

    E-Print Network [OSTI]

    He, Xubin "Ben"

    SPEK: A Storage Performance Evaluation Kernel Module for Block Level Storage Systems Ming Zhang storage systems at block level. It can be used for both DAS (Direct Attached Storage) and block level networked storage systems. Each SPEK tool consists of a controller, several workers, and one or more probers

  11. ret2dir: Rethinking Kernel Isolation Vasileios P. Kemerlis Michalis Polychronakis Angelos D. Keromytis

    E-Print Network [OSTI]

    Yang, Junfeng

    page frame sharing can be leveraged for the complete circumven- tion of software and hardware kernel, and kGuard. We also discuss techniques for constructing reliable ret2dir exploits against x86, x86-level software has become much harder, as recent versions of popular OSes come with nu- merous protections

  12. KLAS FreeBSD GNU C A Kernel Profiler based on Aspect-orientation

    E-Print Network [OSTI]

    Chiba, Shigeru

    in the C language. That code fragment is automatically executed for collecting detailed performance data KLAS C KLAS KLAS KLAS FreeBSD GNU C A Kernel Profiler based on Aspect-orientation Yoshisato corresponding to the member accesses. We have implemented this feature by extending the GNU C compiler

  13. UNCORRECTED 2 Kernel-based distance metric learning for content-based image retrieval

    E-Print Network [OSTI]

    Yeung, Dit-Yan

    UNCORRECTED PROOF 1 2 Kernel-based distance metric learning for content-based image retrieval 3 and Technology, Clear Water Bay, Kowloon, Hong Kong 5 Received 24 August 2005; received in revised form 16 images, the performance of a content-based image retrieval (CBIR) system 9 depends critically

  14. A New Kernel Method for Object Recognition: Spin Glass-Markov Random Fields

    E-Print Network [OSTI]

    Caputo, Barbara

    A New Kernel Method for Object Recognition: Spin Glass-Markov Random Fields BARBARA CAPUTO Doctoral table, our car in a parking lot, and so on. While this task is performed with great accuracy with energy function derived from results of statistical physics of spin glasses. Markov random fields

  15. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  16. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  17. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  18. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  19. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  20. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  1. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  2. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  3. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  4. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  5. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  6. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  9. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  10. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  11. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  12. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  13. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  14. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  15. Discrete beta dose kernel matrices for nuclides applied in targeted radionuclide therapy (TRT) calculated with MCNP5

    SciTech Connect (OSTI)

    Reiner, Dora; Blaickner, Matthias; Rattay, Frank

    2009-11-15

    Purpose: Radiopharmaceuticals administered in targeted radionuclide therapy (TRT) rely to a great extent not only on beta-emitting nuclides but also on emitters of monoenergetic electrons. Recent advances like combined PET/CT devices, the consequential coregistration of both data, the concept of using beta couples for diagnosis and therapy, respectively, as well as the development of voxel models offer a great potential for developing TRT dose calculation systems similar to those available for external beam treatment planning. The deterministic algorithms in question for this task are based on the convolution of three-dimensional matrices, one representing the activity distribution and the other the dose point kernel. This study aims to report on three-dimensional kernel matrices for various nuclides used in TRT. Methods: The Monte Carlo code MCNP5 was used to calculate discrete dose kernels of beta particles including the contributions from their respective secondary radiation in soft tissue for the following nuclides: {sup 32}P, {sup 33}P, {sup 67}Cu, {sup 89}Sr, {sup 90}Y, {sup 103}Rh{sup m}, {sup 131}I, {sup 177}Lu, {sup 186}Re, and {sup 188}Re. For each nuclide a kernel cube of 10x10x10 mm{sup 3} was calculated, the dimensions of a voxel being 1 mm{sup 3}. Additional kernels with voxel sizes of 3x3x3 mm{sup 3} were simulated. Results: Comparison with the S-value data regarding {sup 32}P, {sup 89}Sr, {sup 90}Y, and {sup 131}I of the MIRD committee which were calculated with the EGS4 code showed a very good agreement, the secondary particle transport of {sup 90}Y being the only exception. Documented analytical kernels on the other side show deviations very close and very far to the source. Conclusions: The good accordance with the only discrete dose kernels published up to date justifies the method chosen. Together with the additional six nuclides, this report provides a considerable database for three-dimensional kernel matrices with regard to beta radionuclides applied in TRT. In contrast to analytical dose point kernels, the discrete kernels elude the problem of overestimation near the source and take energy depositions into account, which occur beyond the range of the continuous-slowing-down approximation (csda range). Recalculation of the 1x1x1 mm{sup 3} kernels to other dose kernels with varying voxel dimensions, cubic or noncubic, is shown to be easily manageable and thereby provides a resolution-independent system of dose calculation.

  16. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  17. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  18. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  19. CrossWalk: A Tool for Performance Profiling Across the UserKernel Boundary (ParCo Preprint)

    E-Print Network [OSTI]

    Miller, Barton P.

    significant amount of their time in the operating system. As a result, conventional user­level profilers canWalk. By drilling down into the kernel, we were able to identify the ultimate cause of its performance problems

  20. SU-E-T-209: Independent Dose Calculation in FFF Modulated Fields with Pencil Beam Kernels Obtained by Deconvolution

    SciTech Connect (OSTI)

    Azcona, J; Burguete, J

    2014-06-01

    Purpose: To obtain the pencil beam kernels that characterize a megavoltage photon beam generated in a FFF linac by experimental measurements, and to apply them for dose calculation in modulated fields. Methods: Several Kodak EDR2 radiographic films were irradiated with a 10 MV FFF photon beam from a Varian True Beam (Varian Medical Systems, Palo Alto, CA) linac, at the depths of 5, 10, 15, and 20cm in polystyrene (RW3 water equivalent phantom, PTW Freiburg, Germany). The irradiation field was a 50 mm diameter circular field, collimated with a lead block. Measured dose leads to the kernel characterization, assuming that the energy fluence exiting the linac head and further collimated is originated on a point source. The three-dimensional kernel was obtained by deconvolution at each depth using the Hankel transform. A correction on the low dose part of the kernel was performed to reproduce accurately the experimental output factors. The kernels were used to calculate modulated dose distributions in six modulated fields and compared through the gamma index to their absolute dose measured by film in the RW3 phantom. Results: The resulting kernels properly characterize the global beam penumbra. The output factor-based correction was carried out adding the amount of signal necessary to reproduce the experimental output factor in steps of 2mm, starting at a radius of 4mm. There the kernel signal was in all cases below 10% of its maximum value. With this correction, the number of points that pass the gamma index criteria (3%, 3mm) in the modulated fields for all cases are at least 99.6% of the total number of points. Conclusion: A system for independent dose calculations in modulated fields from FFF beams has been developed. Pencil beam kernels were obtained and their ability to accurately calculate dose in homogeneous media was demonstrated.

  1. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  2. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  3. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  4. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  5. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  6. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  7. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  8. Stein's method, heat kernel, and traces of powers of elements of compact Lie groups

    E-Print Network [OSTI]

    Jason Fulman

    2010-05-07

    Combining Stein's method with heat kernel techniques, we show that the trace of the jth power of an element of U(n,C), USp(n,C) or SO(n,R) has a normal limit with error term of order j/n. In contrast to previous works, here j may be growing with n. The technique should prove useful in the study of the value distribution of approximate eigenfunctions of Laplacians.

  9. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  10. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  11. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  12. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  13. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  14. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  15. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  16. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  17. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  18. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  19. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  20. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  1. Phenomenological memory-kernel master equations and time-dependent Markovian processes

    E-Print Network [OSTI]

    L. Mazzola; E. -M. Laine; H. -P. Breuer; S. Maniscalco; J. Piilo

    2011-03-03

    Do phenomenological master equations with memory kernel always describe a non-Markovian quantum dynamics characterized by reverse flow of information? Is the integration over the past states of the system an unmistakable signature of non-Markovianity? We show by a counterexample that this is not always the case. We consider two commonly used phenomenological integro-differential master equations describing the dynamics of a spin 1/2 in a thermal bath. By using a recently introduced measure to quantify non-Markovianity [H.-P. Breuer, E.-M. Laine, and J. Piilo, Phys. Rev. Lett. 103, 210401 (2009)] we demonstrate that as far as the equations retain their physical sense, the key feature of non-Markovian behavior does not appear in the considered memory kernel master equations. Namely, there is no reverse flow of information from the environment to the open system. Therefore, the assumption that the integration over a memory kernel always leads to a non-Markovian dynamics turns out to be vulnerable to phenomenological approximations. Instead, the considered phenomenological equations are able to describe time-dependent and uni-directional information flow from the system to the reservoir associated to time-dependent Markovian processes.

  2. Review of Enabling Technologies to Facilitate Secure Compute Customization

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pelfrey, Daniel S; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution environments. As part of our technology review we analyzed several current virtualization solutions to assess their vulnerabilities. This included a review of common vulnerabilities and exposures (CVEs) for Xen, KVM, LXC and Docker to gauge their susceptibility to different attacks. The complete details are provided in Section 5 on page 33. Based on this review we concluded that system-level virtualization solutions have many more vulnerabilities than OS level virtualization solutions. As such, security mechanisms like sVirt (Section 3.3) should be considered when using system-level virtualization solutions in order to protect the host against exploits. The majority of vulnerabilities related to KVM, LXC, and Docker are in specific regions of the system. Therefore, future "zero day attacks" are likely to be in the same regions, which suggests that protecting these areas can simplify the protection of the host and maintain the isolation between users. The evaluations of virtualization technologies done thus far are discussed in Section 4. This includes experiments with 'user' namespaces in VEs, which provides the ability to isolate user privileges and allow a user to run with different UIDs within the container while mapping them to non-privileged UIDs in the host. We have identified Linux namespaces as a promising mechanism to isolate shared resources, while maintaining good performance. In Section 4.1 we describe our tests with LXC as a non-root user and leveraging namespaces to control UID/GID mappings and support controlled sharing of parallel file-systems. We highlight several of these namespace capabilities in Section 6.2.3. The other evaluations that were performed during this initial phase of work provide baseline performance data for comparing VEs and VMs to purely native execution. In Section 4.2 we performed tests using the High-Performance Computing Conjugate Gradient (HPCCG) benchmark to establish baseline performance for a scientific application when run on the Native (host) machine in contrast with execution under Docker and KVM. Our tests verified prior studie

  3. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  4. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  5. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  6. Reference Manual Supercomputing Technologies Group

    E-Print Network [OSTI]

    on a Pentium 4 running a patched Fedora Core 2 kernel. · Many bug fixes. · Tested on redhat 7.3 (x86), fedora

  7. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  8. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  9. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  10. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  11. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  12. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  13. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  14. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  15. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  16. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  17. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  18. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  19. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  20. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  1. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  2. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  3. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  5. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  6. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  7. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  8. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  9. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  10. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  11. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  12. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  13. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  14. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  15. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  16. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  17. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  18. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  19. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  20. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  1. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  2. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  3. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  4. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  5. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  6. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  7. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  8. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  9. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  10. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  11. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  12. TURBULENCE-INDUCED RELATIVE VELOCITY OF DUST PARTICLES. IV. THE COLLISION KERNEL

    SciTech Connect (OSTI)

    Pan, Liubin [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States); Padoan, Paolo, E-mail: lpan@cfa.harvard.edu, E-mail: ppadoan@icc.ub.edu [ICREA and Institut de Ciències del Cosmos, Universitat de Barcelona, IEEC-UB, Martí Franquès 1, E-08028 Barcelona (Spain)

    2014-12-20

    Motivated by its importance for modeling dust particle growth in protoplanetary disks, we study turbulence-induced collision statistics of inertial particles as a function of the particle friction time, ?{sub p}. We show that turbulent clustering significantly enhances the collision rate for particles of similar sizes with ?{sub p} corresponding to the inertial range of the flow. If the friction time, ?{sub p,} {sub h}, of the larger particle is in the inertial range, the collision kernel per unit cross section increases with increasing friction time, ?{sub p,} {sub l}, of the smaller particle and reaches the maximum at ?{sub p,} {sub l} = ?{sub p,} {sub h}, where the clustering effect peaks. This feature is not captured by the commonly used kernel formula, which neglects the effect of clustering. We argue that turbulent clustering helps alleviate the bouncing barrier problem for planetesimal formation. We also investigate the collision velocity statistics using a collision-rate weighting factor to account for higher collision frequency for particle pairs with larger relative velocity. For ?{sub p,} {sub h} in the inertial range, the rms relative velocity with collision-rate weighting is found to be invariant with ?{sub p,} {sub l} and scales with ?{sub p,} {sub h} roughly as ? ?{sub p,h}{sup 1/2}. The weighting factor favors collisions with larger relative velocity, and including it leads to more destructive and less sticking collisions. We compare two collision kernel formulations based on spherical and cylindrical geometries. The two formulations give consistent results for the collision rate and the collision-rate weighted statistics, except that the spherical formulation predicts more head-on collisions than the cylindrical formulation.

  13. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  14. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  15. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  16. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  17. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  18. The Flux OSKit: A Substrate for Kernel and Language Research Bryan Ford Godmar Back Greg Benson Jay Lepreau Albert Lin Olin Shivers

    E-Print Network [OSTI]

    Ford, Bryan

    The Flux OSKit: A Substrate for Kernel and Language Research Bryan Ford Godmar Back Greg Benson Jay a basic useful OS core--e.g., the functionality traditionally found in the Unix kernel--entirely from suited for physical memory and its Ford, Back, and Lepreau are at the Univ. of Utah (baford

  19. The Flux OSKiti A Substrate for Kernel and Language Research Bryan Ford Godmar Back Greg Benson Jay Lepreau Albert Lin Olin Shivers

    E-Print Network [OSTI]

    Brown, Angela Demke

    The Flux OSKiti A Substrate for Kernel and Language Research Bryan Ford Godmar Back Greg Benson Jay a basic useful OS core-eg., the functionality traditionally found in the Unix kernel-entirely from scratch for physical memory and its Ford, Back, and Lqreau are at the Univ. of Utah @aford,gback,lepreau- @cs

  20. Power counting and renormalization group invariance in the subtracted kernel method for the two-nucleon system

    E-Print Network [OSTI]

    Sérgio Szpigel; Varese S. Timóteo

    2012-07-26

    We apply the subtracted kernel method (SKM), a renormalization approach based on recursive multiple subtractions performed in the kernel of the scattering equation, to the chiral nucleon-nucleon (NN) interactions up to next-to-next-to-leading-order (NNLO). We evaluate the phase-shifts in the 1S0 channel at each order in Weinberg's power counting scheme and in a modified power counting scheme which yields a systematic power-law improvement. We also explicitly demonstrate that the SKM procedure is renormalization group invariant under the change of the subtraction scale through a non-relativistic Callan-Symanzik flow equation for the evolution of the renormalized NN interactions.

  1. Noise kernel for a quantum field in Schwarzschild spacetime under the Gaussian approximation

    E-Print Network [OSTI]

    A. Eftekharzadeh; Jason D. Bates; Albert Roura; Paul R. Anderson; B. L. Hu

    2011-10-31

    A method is given to compute an approximation to the noise kernel, defined as the symmetrized connected 2-point function of the stress tensor, for the conformally invariant scalar field in any spacetime conformal to an ultra-static spacetime for the case in which the field is in a thermal state at an arbitrary temperature. The most useful applications of the method are flat space where the approximation is exact and Schwarzschild spacetime where the approximation is better than it is in most other spacetimes. The two points are assumed to be separated in a timelike or spacelike direction. The method involves the use of a Gaussian approximation which is of the same type as that used by Page to compute an approximate form of the stress tensor for this field in Schwarzschild spacetime. All components of the noise kernel have been computed exactly for hot flat space and one component is explicitly displayed. Several components have also been computed for Schwarzschild spacetime and again one component is explicitly displayed.

  2. Fast dose kernel interpolation using Fourier transform with application to permanent prostate brachytherapy dosimetry

    SciTech Connect (OSTI)

    Liu, Derek Sloboda, Ron S.

    2014-05-15

    Purpose: Boyer and Mok proposed a fast calculation method employing the Fourier transform (FT), for which calculation time is independent of the number of seeds but seed placement is restricted to calculation grid points. Here an interpolation method is described enabling unrestricted seed placement while preserving the computational efficiency of the original method. Methods: The Iodine-125 seed dose kernel was sampled and selected values were modified to optimize interpolation accuracy for clinically relevant doses. For each seed, the kernel was shifted to the nearest grid point via convolution with a unit impulse, implemented in the Fourier domain. The remaining fractional shift was performed using a piecewise third-order Lagrange filter. Results: Implementation of the interpolation method greatly improved FT-based dose calculation accuracy. The dose distribution was accurate to within 2% beyond 3 mm from each seed. Isodose contours were indistinguishable from explicit TG-43 calculation. Dose-volume metric errors were negligible. Computation time for the FT interpolation method was essentially the same as Boyer's method. Conclusions: A FT interpolation method for permanent prostate brachytherapy TG-43 dose calculation was developed which expands upon Boyer's original method and enables unrestricted seed placement. The proposed method substantially improves the clinically relevant dose accuracy with negligible additional computation cost, preserving the efficiency of the original method.

  3. Density-Aware Clustering Based on Aggregated Heat Kernel and Its Transformation

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Huang, Hao; Yoo, Shinjae; Yu, Dantong; Qin, Hong

    2015-06-01

    Current spectral clustering algorithms suffer from the sensitivity to existing noise, and parameter scaling, and may not be aware of different density distributions across clusters. If these problems are left untreated, the consequent clustering results cannot accurately represent true data patterns, in particular, for complex real world datasets with heterogeneous densities. This paper aims to solve these problems by proposing a diffusion-based Aggregated Heat Kernel (AHK) to improve the clustering stability, and a Local Density Affinity Transformation (LDAT) to correct the bias originating from different cluster densities. AHK statistically\\ models the heat diffusion traces along the entire time scale, somore »it ensures robustness during clustering process, while LDAT probabilistically reveals local density of each instance and suppresses the local density bias in the affinity matrix. Our proposed framework integrates these two techniques systematically. As a result, not only does it provide an advanced noise-resisting and density-aware spectral mapping to the original dataset, but also demonstrates the stability during the processing of tuning the scaling parameter (which usually controls the range of neighborhood). Furthermore, our framework works well with the majority of similarity kernels, which ensures its applicability to many types of data and problem domains. The systematic experiments on different applications show that our proposed algorithms outperform state-of-the-art clustering algorithms for the data with heterogeneous density distributions, and achieve robust clustering performance with respect to tuning the scaling parameter and handling various levels and types of noise.« less

  4. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  5. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  6. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  7. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  8. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  9. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  10. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  11. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  12. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  13. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  14. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  15. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  16. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12

  19. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNRELNuclear Security

  20. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOE Office of99SavingTrilateralUnionSecurity

  1. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel MagnetizationTransportationVideos HomePower HomeSecurity

  2. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  3. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  4. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  5. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  6. taiwan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    taiwan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  7. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  8. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  9. Cyber Security | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant,...

  10. hrp | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    hrp | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  11. sliderphotos | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  12. Trident | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Trident | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. Nike | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nike | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  14. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  15. PIA - WEB Physical Security Major Application | Department of...

    Energy Savers [EERE]

    PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PDF icon PIA - WEB Physical Security Major...

  16. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  17. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  18. The National Security Policy Process: The National Security Council and Interagency System

    E-Print Network [OSTI]

    Huang, Wei

    The National Security Policy Process: The National Security Council and Interagency System By Alan Update: August 15, 2011 #12;THIS PAGE INTENTIONALLY BLANK 2 #12;Table of Contents The National Security Policy Process: The National Security Council and Interagency System

  19. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    » Cybercrime and cyberterrorism » Information technology of little use without security 3 #12;GEORGGEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2

  20. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  1. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  2. Computer Security Division 2009 Annual Report

    E-Print Network [OSTI]

    Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

  3. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y. (Rochester, MN)

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  4. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01

    system engineer. A tool is developed to support the steps supporting this methodology and help to bridge the smart metering domain. Copyright © 2013 John Wiley & Sons, Ltd. KEYWORDS model-based engineering; security engineering; security ontology; domain-specific modelling; embedded systems; smart metering

  5. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vendor has issued a fix: 1. Cisco Secure ACS version 5.1: File 5-1-0-44-6.tar.gpg - ACS 5.1.0.44 cumulative patch 6 2. Cisco Secure ACS version 5.2: File...

  6. PRACTICAL SECURITY Implementing Security Education at a Small Community College

    E-Print Network [OSTI]

    Whatcom Community College Abstract: This paper discusses modifying an existing two-year degree to include, and introducing an information security specialty into an existing degree can be challenging. At Whatcom Community ASSURANCE CURRICULUM At the beginning of the 2003-2004 academic year, Whatcom had one security course

  7. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  8. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  10. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  11. Bed Bugs (Spanish) 

    E-Print Network [OSTI]

    Howell Jr., Harry N.

    2002-01-18

    de caf? a rojo p?lido. El color, forma y tama?o de una chinche reci?n alimentada es marcada- mente diferente a los de una chinche sin comer. Los huevos de la chinche dom?stica son blancos y miden aproximadamente 1 /32 de pulgada. Chinches reci...

  12. Bugs, Drugs & Smoke

    E-Print Network [OSTI]

    WHO

    2012-01-01

    therapy of cholera among Bangladesh refugees. The Johnscentimetres long Photo 1.6. Bangladesh, 1975. A volunteercould defeat it anywhere – in Bangladesh, in Pakistan and in

  13. Cray Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent Bonding in Actinide Sandwich Molecules PrintCraftingReports Cray

  14. Cray Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent Bonding in Actinide Sandwich Molecules PrintCraftingReports

  15. CAF Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransenBusiness networkingFleetPuget SoundSystemWood

  16. CAF Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransenBusiness networkingFleetPuget

  17. UPC Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservationBio-Inspired SolarAbout /Two0 - 19 Publications 1. Xie, Z.; Ma,UNIRIB DEPARTMENT UPC

  18. CAF Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAudits &Bradbury Science Museum6 Shares ofDOE/WIPP-97-2238AMonument CAF »

  19. Cray Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAuditsClusterInformationContractCorporate CultureCounting smallN N

  20. PGI Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access toOctoberConsumptionPoweredE ContractMarchAnMeetingsNovember 2013

  1. PGI Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access toOctoberConsumptionPoweredE ContractMarchAnMeetingsNovember

  2. PGI Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access toOctoberConsumptionPoweredE

  3. Intel Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLANIs gravity aOverviewISMscientist

  4. Intel Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLANIs gravity aOverviewISMscientistJanuary 2014 Invoking

  5. Intel Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLANIs gravity aOverviewISMscientistJanuary 2014 Invoking4

  6. Intel Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLANIs gravity aOverviewISMscientistJanuary 2014 Invoking45

  7. Intel Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLANIs gravity aOverviewISMscientistJanuary 2014

  8. Intel Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibiting IndividualIntegrating Information, Science,Intel »

  9. GNU Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journal Article)ForthcomingGENERAL ASSIGNMENT KNOW ALL MENGLOBALReports GNU

  10. GNU Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journal Article)ForthcomingGENERAL ASSIGNMENT KNOW ALL MENGLOBALReports

  11. PGI Bug Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/O Streams forOrhan Kizilkaya,P. Leslie Dutton0BPETScAugustPGI

  12. Risk-driven Security Testing versus Test-driven Security Risk Analysis

    E-Print Network [OSTI]

    Stølen, Ketil

    Risk-driven Security Testing versus Test-driven Security Risk Analysis Gencer Erdogan1 the combinations of se- curity testing and security risk analysis depending on whether it is viewed from a security testing perspective or a security risk analysis perspective. The main focus in the former view is security

  13. GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl MIT Laboratory give a simple proof that GM-security and semantic security are equivalent security no- tions for public security definitions which are still the mostly used ones today. The two notions are called `GM

  14. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  15. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  16. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  17. Trusted Cloud: Microsoft Azure Security, Privacy,

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance April 2015 #12;Trusted Cloud................................................................. 18 #12;Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance | April, 2015 Introduction: Microsoft Azure Security, Privacy, and Compliance | April, 2015 #12;3 Contents Introduction

  18. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01

    plants as a form of energy security in the absence of suffi-can be drawn. The energy security situation and outlook areregional cooperation on energy and security issues in Asia.

  19. POLICYProfessional Perspectives on Energy Security, Economics,

    E-Print Network [OSTI]

    TheGoalsof ENERGY POLICYProfessional Perspectives on Energy Security, Economics Security, Economics, and the Environment The Goals of Energy Policy: Professional Perspectives on Energy Security, Economics, and the Environment EXECUTIVE SUMMARY Energy-related incidents and issues ­ the BP

  20. Security Design and Information Aggregation in Markets

    E-Print Network [OSTI]

    Chen, Yiling

    Security Design and Information Aggregation in Markets Yiling Chen Anthony M. Kwasnica Abstract that information aggregation ability of markets is affected by the security design. Behavior of individual Keywords: Security design; Information aggregation; Information market; Price convergence. 1 Introduction