Powered by Deep Web Technologies
Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Aldridge, Hal [ORNL; Duren, Mike [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC; Bertino, Elisa [ORNL; Kulatunga, Athula [Purdue University; Navaratne, Uditha Sudheera [Purdue University

2011-01-01T23:59:59.000Z

2

Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure  

Science Conference Proceedings (OSTI)

Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider ... Keywords: cryptographic key management system (CKMS), key management, security, security models/metrics, smart grid, testing/experimentation, trusted hardware

Michael Duren; Hal Aldridge; Robert K. Abercrombie; Frederick T. Sheldon

2013-01-01T23:59:59.000Z

3

Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure  

Science Conference Proceedings (OSTI)

Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution and management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.

Duren, Mike [Sypris Electronics, LLC; Aldridge, Hal [ORNL; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL

2013-01-01T23:59:59.000Z

4

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... A Framework for Designing Cryptographic Key Management Systems ... A Framework for Designing Cryptographic Key Management Systems ...

2013-08-13T23:59:59.000Z

5

Cryptographic Key Management Workshop 2010  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2010. Purpose: ... Related Project(s): Cryptographic Key Management Project. Details: ...

2013-08-01T23:59:59.000Z

6

Group key management  

SciTech Connect

This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

Dunigan, T.; Cao, C.

1997-08-01T23:59:59.000Z

7

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... responsible to executive-level management (eg, the Chief Information Officer) for the ... entity information, keys, and metadata into a database used by ...

2013-08-15T23:59:59.000Z

8

Cryptographic Key Management Workshop 2012  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2012. Purpose: NIST is conducting a two-day Key Management Workshop on September 10-11. ...

2013-08-01T23:59:59.000Z

9

Cryptographic Key Management Workshop 2009 - A Holistic ...  

Science Conference Proceedings (OSTI)

... policies Board of Directors CEO Protect critical data CSO/CISO CIO We aren't ... Encrypted Database Management Encrypted Tape Key Management ...

2012-05-07T23:59:59.000Z

10

Proactive key management protocol for multicast services  

Science Conference Proceedings (OSTI)

A group key management is essential scheme guaranteeing data confidentiality in multicast. To provide the strict secrecy in group communication, the rekeying delay has to be minimized. In this paper, we propose a new group key management protocol, called ...

Dong-Hyun Je; Seung-Woo Seo

2009-06-01T23:59:59.000Z

11

Key Management Challenges in Smart Grid  

Science Conference Proceedings (OSTI)

Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

Sheldon, Frederick T [ORNL; Duren, Mike [Sypris Electronics, LLC

2012-01-01T23:59:59.000Z

12

DOE M 200.1-1 Chapter 9, Public Key Cryptography and Key Management  

Directives, Delegations, and Requirements

The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key ...

2000-02-15T23:59:59.000Z

13

PKM: a pairwise key management scheme for wireless sensor networks  

Science Conference Proceedings (OSTI)

Sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive ... Keywords: key distribution, key management, security, sensor networks

F. An; X. Cheng; J. M. Rivera; J. Li; Z. Cheng

2005-08-01T23:59:59.000Z

14

Cryptographic Key Managment Workshop 2012-A Draft ...  

Science Conference Proceedings (OSTI)

... Specify the key generation methods used Specify the random number generators used Specify ... primary and backup facilities ...

2012-09-11T23:59:59.000Z

15

Cryptographic Key Management Workshop 2009 - Cloud ...  

Science Conference Proceedings (OSTI)

... Customer 2 Resource demand: ... VMXLAUNCH VMXRESUME VMXCALL side effects ... I/O events page table management privileged instructions ...

2012-05-07T23:59:59.000Z

16

Cryptographic Key Management Project - Comments on the ...  

Science Conference Proceedings (OSTI)

... planned digital signature lifetime (based on the key strength ... Will the CAVP provide a standalone DH test that ... for about an eighth of the cost of 2.5 ...

2012-05-07T23:59:59.000Z

17

Managing Supply Chain Key for Hawaii Appliance Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program August 24, 2010 - 10:00am Addthis Lindsay Gsell Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold. Funded by $1.2 million from the American Recovery and Reinvestment Act, the program delivered a proportionate number of $250 ENERGY STAR refrigerator rebates to six of Hawaii's islands: Oahu, Hawaii, Maui, Kauai, Lanai, and Molokai. "It takes a lot of help from manufacturers, distributors, retailers, hauling company, recyclers, advertisers, printers, new reporters, radio stations and television station to create a success story," said Derrick

18

Managing Supply Chain Key for Hawaii Appliance Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program August 24, 2010 - 10:00am Addthis Lindsay Gsell Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold. Funded by $1.2 million from the American Recovery and Reinvestment Act, the program delivered a proportionate number of $250 ENERGY STAR refrigerator rebates to six of Hawaii's islands: Oahu, Hawaii, Maui, Kauai, Lanai, and Molokai. "It takes a lot of help from manufacturers, distributors, retailers, hauling company, recyclers, advertisers, printers, new reporters, radio stations and television station to create a success story," said Derrick

19

Using Key Performance Indicators to Manage Energy Costs  

E-Print Network (OSTI)

Modern management systems rely heavily on information technology to set goals, track performance and communicate results. Energy management approaches (such as those offered by the US Department of Energy and Natural Resources Canada) and measurement and verification protocols (such as IPMVP 2001) often highlight the importance an information system has in maximizing results. The increasing adoption of energy information systems has led, however, to an interesting paradox: while it is now cost-effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators (KPIs) to summarize volumes of data into a few critical nuggets of actionable information. These KPIs provide both the metrics that will be used to determine the success of a business plan as well as the timely information managers need to track performance and make adjustments to ensure success. A similar approach can be used in the practice of energy management, where KPIs can be designed to measure the success of key elements in an energy management plan and provide energy managers with the timely nuggets of information they need to ensure success. This paper describes how to define and use KPIs to track the performance and measure the success of an energy management plan. A framework is provided to assist in selecting measurable goals from an energy management plan and determine the raw data and processing required to generate the associated KPIs.

Van Gorp, J. C.

2005-01-01T23:59:59.000Z

20

Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by by Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative *Ways of Using Wireless Technology to Help You Reduce Energy Usage at your Facility Together with our industry partners, we strive to: * Accelerate adoption of the many energy-efficient technologies and practices available today * Conduct vigorous technology innovation to radically improve future energy diversity, resource efficiency, and carbon mitigation * Promote a corporate culture of energy efficiency and carbon management What Is the Industrial Technologies Program ? The Industrial Technologies Program (ITP) is the lead federal agency responsible for improving energy efficiency in the largest energy-using sector of the country. Industrial Sector National Initiative

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

The Seven Keys to Success in Energy Management and Conservation  

E-Print Network (OSTI)

This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process of initiating an energy management program is detailed. The establishment of long range goals, together with the organization and commitment to accomplish these goals are specified. The necessity of performing an energy audit is discussed, together with an explanation of the three 'types' of energy used in a manufacturing facility. The requirement of having a good 'energy ethic' among all employees is discussed in detail. The method of monitoring the program and measuring results is also discussed.

Darby, D. F.

1984-01-01T23:59:59.000Z

22

Key management and encryption under the bounded storage model.  

SciTech Connect

There are several engineering obstacles that need to be solved before key management and encryption under the bounded storage model can be realized. One of the critical obstacles hindering its adoption is the construction of a scheme that achieves reliable communication in the event that timing synchronization errors occur. One of the main accomplishments of this project was the development of a new scheme that solves this problem. We show in general that there exist message encoding techniques under the bounded storage model that provide an arbitrarily small probability of transmission error. We compute the maximum capacity of this channel using the unsynchronized key-expansion as side-channel information at the decoder and provide tight lower bounds for a particular class of key-expansion functions that are pseudo-invariant to timing errors. Using our results in combination with Dziembowski et al. [11] encryption scheme we can construct a scheme that solves the timing synchronization error problem. In addition to this work we conducted a detailed case study of current and future storage technologies. We analyzed the cost, capacity, and storage data rate of various technologies, so that precise security parameters can be developed for bounded storage encryption schemes. This will provide an invaluable tool for developing these schemes in practice.

Draelos, Timothy John; Neumann, William Douglas; Lanzone, Andrew J.; Anderson, William Erik

2005-11-01T23:59:59.000Z

23

Optimising waste management performance - The key to successful decommissioning  

SciTech Connect

Available in abstract form only. Full text of publication follows: On the 1. of April 2005 the United Kingdom's Nuclear Decommissioning Authority became responsible for the enormous task of decommissioning the UK's civilian nuclear liabilities. The success of the NDA in delivering its key objectives of safer, cheaper and faster decommissioning depends on a wide range factors. It is self-evident, however, that the development of robust waste management practices by those charged with decommissioning liability will be at the heart of the NDA's business. In addition, the implementation of rigorous waste minimisation techniques throughout decommissioning will deliver tangible environmental benefits as well as better value for money and release funds to accelerate the decommissioning program. There are mixed views as to whether waste minimisation can be achieved during decommissioning. There are those that argue that the radioactive inventory already exists, that the amount of radioactivity cannot be minimised and that the focus of activities should be focused on waste management rather than waste minimisation. Others argue that the management and decommissioning of the UK's civilian nuclear liability will generate significant volumes of additional radioactive waste and it is in this area where the opportunities for waste minimisation can be realised. (author)

Keep, Matthew [Entec UK Limited. 17 Angel Gate. City Road. London EC1V 2SH (United Kingdom)

2007-07-01T23:59:59.000Z

24

KALwEN: a new practical and interoperable key management scheme for body sensor networks  

Science Conference Proceedings (OSTI)

Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challengessome inherited from wireless sensor networks (WSNs), some unique to themselvesthat require a new key management scheme to be tailor-made. ... Keywords: body area networks, body sensor networks, healthcare, key management, security

Yee Wei Law; Giorgi Moniava; Zheng Gong; Pieter Hartel; Marimuthu Palaniswami

2011-11-01T23:59:59.000Z

25

NIST SP 800-57, Recommendation for Key Management ...  

Science Conference Proceedings (OSTI)

... service use a hash function as a component of the ... mitigated by splitting the key into components that are ... a. When a symmetric key is used only for ...

2012-12-12T23:59:59.000Z

26

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

27

Soil and Vegetation Management: Keys to Water Conservation on Rangeland  

E-Print Network (OSTI)

The amount of water that soaks into the soil largely determines plant productivity. We can manage and conserve water where and when it falls, and by controlling the kind of vegetation we can make the fullest use of rain water. This publication illustrations the effects of vegetation management on water availability.

Schuster, Joseph L.

2001-01-11T23:59:59.000Z

28

Security Policies as the Foundation for Cryptographic  

E-Print Network (OSTI)

Security Policies as the Foundation for Cryptographic Key Management Elaine Barker, CKMS Project to Layered Security Policies ­ From Information Management to Key Mngt. ­ From Dept. of Com. To NIST Employees · Security Domains ­ Simple to Complex · Key Management ­ Static to Configurable to Dynamic

29

JM to Cancel DOE M 200.1-1 Ch 9, Public Key Cryptography and Key Management  

Directives, Delegations, and Requirements

The Federal Chief Information Officers' (CIO) Council has consolidated PKI programs into the Identity, Credential, and Access Management (ICAM) Program. PKI ...

2013-06-11T23:59:59.000Z

30

KEY PERSONNEL  

National Nuclear Security Administration (NNSA)

APPENDIX J KEY PERSONNEL 07032013 TITLE NAME President Christopher C. Gentile Vice President, Operations Robin Stubenhofer Director, Sr. Program Management Rick Lavelock...

31

Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)  

SciTech Connect

In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Hauser, Katie R [ORNL; Lantz, Margaret W [ORNL; Mili, Ali [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

32

Secure multi-party communication with quantum key distribution managed by trusted authority  

DOE Patents (OSTI)

Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

2013-07-09T23:59:59.000Z

33

Better management of energy knowledge: the key for success in the energy sector  

Science Conference Proceedings (OSTI)

Over the past several years there have been intensive discussions about the importance of knowledge management (KM) within our society. As we are moving into an era of "knowledge capitalism", the management of knowledge is promoted as ... Keywords: best practices, energy knowledge, energy sector, innovation, knowledge management

Kostas Metaxiotis

2005-04-01T23:59:59.000Z

34

Assimilation Key to Successful Implementation of Statewide Case Management Systems: Arizona Case Study  

E-Print Network (OSTI)

It is always a precarious situation to put oneself when attempting to acknowledge all those who have been instrumental and in support of ones effort to complete a program of this magnitude. Certainly I must recognize my managers that gave me opportunity to attend class when the demands of work were not always conducive to doing so. Tom Brady, Tempe Municipal Court Manager, and Rick Rager, Deputy Court Manager, were my supervisors at the beginning of this process, allowed me the time for class and encouraged me to attend. Lourraine Arkfeild, Presiding Judge for Tempe Municipal Court, has been a constant source of support while I was working at Tempe, and has continued to be such since I continued my career at the AOC. The opportunity to continue the program after beginning employment at the AOC was afforded me by Janet Scheiderer, Director of Court Services. I would also need to thank the AOC for funding my participation in the program. Additionally, throughout this process I have received input and words of support from so many in the Arizona courts system that I cannot begin to list them all. It is important to note the understanding, encouragement and practical input from my current manager, Renny Rapier, Program Manager for the General Jurisdiction Case Management System Project of which I am the Project Manager. Finally, I must thank my

unknown authors

2008-01-01T23:59:59.000Z

35

Conducting a Motor Survey: Key Step for Establishing a Motor Management Policy  

E-Print Network (OSTI)

Roughly 70% of the energy consumed by manufacturing processes is used by electric motors. According to the U.S. Department of Energy, greater attention to motor systems management can reduce motor-related energy costs by 18%. Establishing a motor management policy is therefore an essential task for any plant manager or engineer concerned with minimizing motor (and process) downtime and reducing energy costs. In order to develop an effective motor policy, a manager needs information on the number and condition of motors in use. A targeted motor survey will collect data on a representative sample of a plant's motor population. This survey information will then provide a basis for further development of the motor policy. This paper discusses the process of conducting a motor survey. It identifies the type of information to be collected, along with a methodology for selecting appropriate sample motors for more detailed investigations.

Miller, R. B.

2002-04-01T23:59:59.000Z

36

Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA)  

Science Conference Proceedings (OSTI)

In earlier work we presented a metric that quantifies system security in terms of the average loss per unit of time incurred by a stakeholder of the system as a result of security threats. The computational infrastructure of this metric involves system ... Keywords: cyber security metrics, information security, risk management

Robert K. Abercrombie; Frederick T. Sheldon; Katie R. Hauser; Margaret W. Lantz; Ali Mili

2013-01-01T23:59:59.000Z

37

Development geology of giant fields on Alaskan North Slope: Key to successful reservoir management  

SciTech Connect

The giant fields on the North Slope of Alaska (combined Permian-Triassic/Lisburne pools at Prudhoe Bay and the Kuparuk River field) produce approximately 2 million BOPD and contain about 30 billion bbl of oil in place. This production rate amounts to almost one-fourth of the US daily production. Because the reservoirs in these fields are complex and the stakes in efficient field management so high, the development geology of these fields presents a great challenge. The technical challenge of managing these fields lies in the fact that secondary and tertiary recovery projects have been initiated soon after start-up to ensure maximum recovery. Thus, the development geologist has to recommend primary development locations while formulating a reservoir description without knowing the full areal extent and heterogeneity of the reservoirs. To support the waterflood and enhanced oil recovery projects, permeability pathways and barriers have been identified using sedimentological, log, and engineering data. Because structure also plays an important role in controlling fluid pathways, the fault geometries, fracture patterns, and detailed structure are being mapped using two-dimensional and three-dimensional seismic, well, and log data. The management challenge of development work in these fields is keeping communications channels open among the development geoscience group and the reservoir, production, operations, and drilling engineers.

Kumar, N. (ARCO Alaska, Inc., Anchorage (USA))

1988-12-01T23:59:59.000Z

38

National Low-Level Waste Management Program final summary report of key activities and accomplishments for fiscal year 1997  

Science Conference Proceedings (OSTI)

The US Department of Energy (DOE) has responsibilities under the Low-Level Radioactive Waste Policy Amendments Act of 1985 to assist states and compacts in their siting and licensing efforts for low-level radioactive waste disposal facilities. The National Low-Level Waste Management Program (NLLWMP) is the element of the DOE that performs the key support activities under the Act. The NLLWMP`s activities are driven by the needs of the states and compacts as they prepare to manage their low-level waste under the Act. Other work is added during the fiscal year as necessary to accommodate new requests brought on by status changes in states` and compacts` siting and licensing efforts. This report summarizes the activities and accomplishments of the NLLWMP during FY 1997.

Rittenberg, R.B.

1998-03-01T23:59:59.000Z

39

NETL F 451.1-1/1 Categorical Exclusion (CX) Designation Form  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ORNL (sub-awardee) ORNL (sub-awardee) OE DE-OE0000543 PMC-EDTD 2010 James Briones 12/1/2010 - 11/30/2013 Oak Ridge, TN Centralized Cryptographic Key Management (CKMS) Design and develop Centralized Cryptographic Key Management(CKMS) and Trusted Certificate Provisioning System (TCPS) & demonstrate the initial technologies for the secure management of cryptographic keys. 11 19 2010 James Briones Digitally signed by James Briones DN: cn=James Briones, o=DOE - NETL, ou=EDTD, email=james.briones@netl.doe.gov, c=US Date: 2010.11.19 09:38:03 -05'00' 12 7 2010 Fred E. Pozzuto Digitally signed by Fred E. Pozzuto DN: cn=Fred E. Pozzuto, o=USDOE, ou=NETL-Office of Project Facilitation and Compliance, email=fred.pozzuto@netl.doe.gov, c=US Reason: I am approving this document Date: 2010.12.07 13:40:47

40

NETL F 451.1-1/1 Categorical Exclusion (CX) Designation Form  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sypris Electronics Sypris Electronics OE DE-OE0000543 PMC-EDTD 2010 James Briones 12/1/2010 - 11/30/2013 Tampa, FL Centralized Cryptographic Key Management (CKMS) Design and develop Centralized Cryptographic Key Management(CKMS) and Trusted Certificate Provisioning System (TCPS) & demonstrate the initial technologies for the secure management of cryptographic keys. 11 19 2010 James Briones Digitally signed by James Briones DN: cn=James Briones, o=DOE - NETL, ou=EDTD, email=james.briones@netl.doe.gov, c=US Date: 2010.11.19 09:38:03 -05'00' 12 7 2010 Fred E. Pozzuto Digitally signed by Fred E. Pozzuto DN: cn=Fred E. Pozzuto, o=USDOE, ou=NETL-Office of Project Facilitation and Compliance, email=fred.pozzuto@netl.doe.gov, c=US Reason: I am approving this document Date: 2010.12.07 11:23:25

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

NETL F 451.1-1/1 Categorical Exclusion (CX) Designation Form  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOA-0000359 FOA-0000359 Purdue University (Sub awardee) OE DE-OE0000543 PMC-EDTD 2010 James Briones 12/1/2010 - 11/30/2013 West Lafayette, Tippecanoe, Indiana Centralized Cryptographic Key Management (CKMS) Design and develop Centralized Cryptographic Key Management(CKMS) and Trusted Certificate Provisioning System (TCPS) & demonstrate the initial technologies for the secure management of cryptographic keys. 11 19 2010 James Briones Digitally signed by James Briones DN: cn=James Briones, o=DOE - NETL, ou=EDTD, email=james.briones@netl.doe.gov, c=US Date: 2010.11.19 09:38:03 -05'00' 12 7 2010 Fred E. Pozzuto Digitally signed by Fred E. Pozzuto DN: cn=Fred E. Pozzuto, o=USDOE, ou=NETL-Office of Project Facilitation and Compliance, email=fred.pozzuto@netl.doe.gov, c=US Reason: I am approving this document

42

Hybrid cryptography key management.  

SciTech Connect

Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited.

Draelos, Timothy John; Torgerson, Mark Dolan; Neumann, William Douglas; Gallup, Donald R.; Collins, Michael Joseph; Beaver, Cheryl Lynn

2003-11-01T23:59:59.000Z

43

STATEMENT OF CONSIDERATIONS REQUEST BY SYPRIS ELECTRONICS LLC, FOR AN ADVANCE WAIVER OF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SYPRIS ELECTRONICS LLC, FOR AN ADVANCE WAIVER OF SYPRIS ELECTRONICS LLC, FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN INVENTION RIGHTS UNDER DOE COOPERATIVE AGREEMENT NO. DE-OE0000543, W(A)-2011-040, CH-1619 The Petitioner, Sypris Electronics, LLC (Sypris) was awarded this cooperative agreement for the performance of work entitled, "Centralized Cryptographic Key Management (CKMS)". According to the response to question 2 of the waiver petition, the CKMS project deals with the problem of managing cryptographic keys for large scale deployment of devices using a centralized system. The system controls, using policies, the generation, distribution, and destruction of keying material. The project also considers the problem of manufacturing devices such that they can be effectively authenticated when deployed. This waiver is only for inventions of Sypris made under

44

Categorical Exclusion Determinations: A1 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 7, 2010 December 7, 2010 CX-004686: Categorical Exclusion Determination Centralized Cryptographic Key Management (CKMS) CX(s) Applied: A1, A9, A11, B1.2 Date: 12/07/2010 Location(s): Tampa, Florida Office(s): Electricity Delivery and Energy Reliability, National Energy Technology Laboratory December 7, 2010 CX-004685: Categorical Exclusion Determination Centralized Cryptographic Key Management (CKMS) CX(s) Applied: A1, A9, A11, B1.2 Date: 12/07/2010 Location(s): West Lafayette, Indiana Office(s): Electricity Delivery and Energy Reliability, National Energy Technology Laboratory December 1, 2010 CX-004728: Categorical Exclusion Determination Energy Efficiency and Conservation Block Grant Program - Michigan-City-St. Clair Shores CX(s) Applied: A1, A9, A11, B1.32, B2.5, B3.6, B5.1

45

Cryptographic Key Managment Workshop 2012-Key ...  

Science Conference Proceedings (OSTI)

... Page 19. Destruction ? Lead jackets to sink code books ... backtrack protection ? Daisy chaining (danger of cascading compromise) Page 22. ...

2012-09-11T23:59:59.000Z

46

Cryptographic Key Management Workshop 2012-Secure Key ...  

Science Conference Proceedings (OSTI)

... VthNMOS Strongest inverter determines start-up preference of SRAM cell ... V T > Strongest inverter determines start-up preference of SRAM cell ...

2012-09-14T23:59:59.000Z

47

On Secure Key Management in Mobile Ad Hoc Networks Dahai Xu Jeffrey Dwoskin Jianwei Huang Mung Chiang Ruby Lee  

E-Print Network (OSTI)

Chiang Ruby Lee Abstract--It is widely believed that although being more complex, a probabilistic key: dahaixu@research.att.com). J. Dwoskin, M. Chiang and R. Lee are with Department of Electrical Engineering

Chiang, Mung

48

GAO-04-611 Nuclear Waste: Absence of Key Management Reforms on Hanford's Cleanup Project Adds to Challenges of Achieving Cost and Schedule Goals  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Committee on Government Committee on Government Reform, House of Representatives June 2004 NUCLEAR WASTE Absence of Key Management Reforms on Hanford's Cleanup Project Adds to Challenges of Achieving Cost and Schedule Goals GAO-04-611 www.gao.gov/cgi-bin/getrpt?GAO-04-611. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robin M. Nazzaro at (202) 512-3841 or nazzaror@gao.gov. Highlights of GAO-04-611, a report to the Committee on Government Reform, House of Representatives June 2004 NUCLEAR WASTE Absence of Key Management Reforms on Hanford's Cleanup Project Adds to Challenges of Achieving Cost and Schedule Goals DOE's initial approach called for treating 10 percent of the site's high-level waste by 2018 and for operating the plant until treatment was completed in

49

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INDIAN COUNTRY ENERGY AND INFRASTRUCTURE WORKING GROUP ICEIWG Key Points & Action Items Inaugural Meeting Thursday, August 25, 2011 Renaissance Denver Hotel Denver, Colorado...

50

KEY THEMES  

Science Conference Proceedings (OSTI)

... may find it difficult to evaluate the effectiveness of the organization's workforce engagement and environmental management processes and ...

2012-09-09T23:59:59.000Z

51

Key Documents  

Science Conference Proceedings (OSTI)

AOCS by-laws, code of ethics and anti trust policy established during our 100+ legacy. Key Documents AOCS History and Governance about us aocs committees contact us division council fats governing board history oils professionals science value cen

52

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Points & Action Items Key Points & Action Items Inaugural Meeting Thursday, August 25, 2011 Renaissance Denver Hotel Denver, Colorado Participants Tracey LeBeau, Director, Pilar Thomas, Deputy Director, and Brandt Petrasek, Special Assistant, Department of Energy, Office of Indian Energy Policy and Programs; Vice Chairman Ronald Suppah and Jim Manion, Confederated Tribes of the Warm Springs Reservation of Oregon; William Micklin, Ewiiaapaayp Band of Kumeyaay Indians; Councilman Barney Enos, Jr., Jason Hauter, Gila River Indian Community; Mato Standing High, Rosebud Sioux Tribe; R. Allen Urban, Yocha Dehe Wintun Nation; Glen Andersen, Scott Hendrick, Brooke Oleen, Jacquelyn Pless, Jim Reed and Julia Verdi, National Conference of State Legislatures-staff

53

Dynamic Group Key Management Protocol  

Science Conference Proceedings (OSTI)

If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. ...

Ghassan Chaddoud; Isabelle Chrisment; Andr Schaff

2001-05-01T23:59:59.000Z

54

BUDGET KEY DATES  

Science Conference Proceedings (OSTI)

BUDGET KEY DATES. For Immediate Release: December 15, 2009. Contact: Diane Belford 301-975-8400. Budget Key Dates.

2013-06-16T23:59:59.000Z

55

Key Technologies, Thermal Management, and Prototype Testing for Advanced Solid-State Hydrogen Storage Systems - DOE Hydrogen and Fuel Cells Program FY 2012 Annual Progress Report  

NLE Websites -- All DOE Office Websites (Extended Search)

9 9 FY 2012 Annual Progress Report DOE Hydrogen and Fuel Cells Program Joseph W. Reiter (Primary Contact), Alexander Raymond, Channing C. Ahn (Caltech), Bret Naylor, Otto Polanco, Rajeshuni Ramesham, and Erik Lopez Jet Propulsion Laboratory (JPL) 4800 Oak Grove Drive, Mail Stop 79-24 Pasadena, CA 91109-8099 Phone: (818) 354-4224; Email: Joseph.W.Reiter@jpl.nasa.gov DOE Managers HQ: Ned Stetson Phone: (202) 586-9995 Email: Ned.Stetson@ee.doe.gov GO: Jesse Adams Phone: (720) 356-1421 Email: Jesse.Adams@go.doe.gov Subcontractor: California Institute of Technology, Pasadena, CA Project Start Date: February, 2009 Project End Date: September, 2014 Fiscal Year (FY) 2012 Objectives Identify state-of-art concepts and designs for * cryosorbent-based hydrogen storage systems

56

Some key Y-12 General Foremen remembered  

NLE Websites -- All DOE Office Websites (Extended Search)

expanded from K-25 to Y-12 and X-10, they brought their management style with them. Clark Center was a key individual. Clark Center Park, still known by old timers as "Carbide...

57

The Key Agreement Schemes  

Science Conference Proceedings (OSTI)

... The three key derivation functions include KDF in Counter Mode, KDF in Feedback Mode, and KDF in Double-Pipeline Iteration Mode. ...

2013-04-23T23:59:59.000Z

58

Cryptographic Key Management Workshop 2012-Designing ...  

Science Conference Proceedings (OSTI)

... install for use with the wireless network ... 2. Card reader installation/ smartcard middleware ... Did you use the PV card to login today? If not why not? ...

2012-09-14T23:59:59.000Z

59

NIST IR 7609, Cryptographic Key Management Workshop ...  

Science Conference Proceedings (OSTI)

... Due to severe weather in the Gaithersburg area ... and control networks, due to energy constraints, and ... for all credit card companies, plus large-scale ...

2012-03-01T23:59:59.000Z

60

New Cryptographic Key Management for Smart Grid.  

E-Print Network (OSTI)

?? A smart grid is a simple upgrade of a power grid, which delivers electricity fromsuppliers to consumers. It uses two-way digital communication in order (more)

ebesta, Filip

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Optical key system  

Science Conference Proceedings (OSTI)

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, K.G.; Clough, R.E.

2000-04-25T23:59:59.000Z

62

Optical key system  

DOE Patents (OSTI)

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

2000-01-01T23:59:59.000Z

63

SR Key Facts  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Facts Savannah River Site Budget FY 2011 Budget Summary FY 2011 SRS EM Program Budget Summary FY 2012 Presidential Budget Request for SRS FY 2014 SRS EM Budget Presentation...

64

Key masking using biometry  

Science Conference Proceedings (OSTI)

We construct an abstract model based on a fundamental similarity property, which takes into account parametric dependencies and reflects a specific collection of requirements. We consider a method for masking a cryptographic key using biometry, which ...

A. L. Chmora

2011-06-01T23:59:59.000Z

65

Key Emergency Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Emergency Information What to Do if an Emergency Arises DOE is committed to public safety in the event an emergency arises. You will likely be made aware that an emergency is...

66

ARM - Key Science Questions  

NLE Websites -- All DOE Office Websites (Extended Search)

govScienceKey Science Questions govScienceKey Science Questions Science Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) ARM Science Team Meetings User Meetings Annual Meetings of the Atmospheric System Research (ASR) Science Team and Fall Working Groups Accomplishments Read about the 20 years of accomplishments (PDF, 696KB) from the ARM Program and user facility. Performance Metrics ASR Metrics 2009 2008 2007 2006 Key Science Questions The role of clouds and water vapor in climate change is not well understood; yet water vapor is the largest greenhouse gas and directly affects cloud cover and the propagation of radiant energy. In fact, there may be positive feedback between water vapor and other greenhouse gases. Carbon dioxide and other gases from human activities slightly warm the

67

Key Research Results Achievement  

E-Print Network (OSTI)

daylighting options for specific spaces with sample design layouts · Various HVAC system types that achieve%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvanced school in Greensburg, Kansas, used many of the energy efficiency measures outlined in the Advanced Energy

68

AP Key Accomplishments  

NLE Websites -- All DOE Office Websites (Extended Search)

Recent Key Accomplishments Recent Key Accomplishments Reduction of Carbon Dioxide Mechanistic insight into CO2 hydrogenation Rapid Transfer of Hydride Ion from a Ruthenium Complex to C1 Species in Water Reversible Hydrogen Storage using CO2 and a Proton-Switchable Iridium Catalyst in Aqueous Media Nickel(II) Macrocycles: Highly Efficient Electrocatalysts for the Selective Reduction of CO2 to CO Calculation of Thermodynamic Hydricities and the Design of Hydride Donors for CO2 Reduction Mechanisms for CO Production from CO2 Using Re(bpy)(CO)3X Catalysts Hydrogen Production Biomass-derived electrocatalytic composites for hydrogen evolution Hydrogen-Evolution Catalysts Based on NiMo Nitride Nanosheets Water Oxidation Enabling light-driven water oxidation via a low-energy RuIV=O intermediate

69

Composite keys? | OpenEI Community  

Open Energy Info (EERE)

Composite keys? Composite keys? Home > Groups > Databus Does DataBus support using composite keys in a Table definition? If not, is there a way to automatically generate a unique value for each entry that is uploaded? Submitted by Hopcroft on 5 September, 2013 - 17:13 1 answer Points: 0 At this time, no, and no way to generate unique key either right now. You can submit a feature request for this though on github. thanks, Dean Deanhiller on 6 September, 2013 - 06:58 Groups Menu You must login in order to post into this group. Recent content Go to My Databus->Data Streams... yes, it is done the same way y... Update rows? How to use streaming chart? if you are an administrator, s... more Group members (6) Managers: Deanhiller Recent members: Hopcroft Vikasgoyal Ksearight NickL

70

STGWG Key Outcomes for May 3, 2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Outcomes-Nashville 2010 Page 1 Key Outcomes-Nashville 2010 Page 1 State and Tribal Government Working Group (STGWG) Nashville, Tennessee - May 3, 2010 KEY OUTCOMES OVERVIEW Members appreciated the participation of all DOE officials at the STGWG meeting in Nashville, and are especially appreciative of the participation of high-level DOE management, such as Sky Gallegos, Deputy Assistant Secretary of the Office of Congressional and Intergovernmental Affairs, and Frank Marcinowski, Acting Chief Technical Officer and Deputy Assistant Secretary for Technical and Regulatory Support. Such participation demonstrates a continuing commitment to improve interaction with tribes and states. STGWG looks forward to our next Intergovernmental meeting with DOE in the fall. FULL STGWG ISSUES

71

Composite keys? | OpenEI Community  

Open Energy Info (EERE)

Composite keys? Home > Groups > Databus Does DataBus support using composite keys in a Table definition? If not, is there a way to automatically generate a unique value for each entry that is uploaded? Submitted by Hopcroft on 5 September, 2013 - 17:13 1 answer Points: 0 At this time, no, and no way to generate unique key either right now. You can submit a feature request for this though on github. thanks, Dean Deanhiller on 6 September, 2013 - 06:58 Groups Menu You must login in order to post into this group. Recent content Go to My Databus->Data Streams... yes, it is done the same way y... Update rows? How to use streaming chart? if you are an administrator, s... more Group members (7) Managers: Deanhiller Recent members: Bradmin Hopcroft Vikasgoyal Ksearight

72

Management  

E-Print Network (OSTI)

Research has indicated that, depending upon driver and passenger characteristics, passengers can have either a positive or negative influence upon driver behaviour. In conclusion to a recent study investigating the roles that passengers can play to influence, positively and negatively, driver behaviour, Regan and Mitsopoulos (2001) recommended, among other things, that the principles of Crew Resource Management (CRM) training may increase passengers ability to positively influence driver behaviour and also drivers ability to accept constructive feedback. The present study investigated the potential application of CRM training within young driver training in the Australian Capital Territory (ACT). This involved a literature review, an analysis of the differences between the driving and aviation domains, an analysis of the team-based activities and the knowledge, skills and attitudes required during driving to perform those activities, consultation with CRM experts from the aviation and medicine domains and the conduct of six focus groups involving young learner drivers, provisional licence drivers and course teachers. The findings indicate that CRM training as part of young driver training in the ACT is a viable concept to pursue. The application of CRM training within young driver training has potential to significantly enhance the positive and reduce the negative effects of passengers on young driver behaviour, and thus the safety of young drivers and passengers alike. The outcomes of this study formed the basis for a set of recommendations for the development of a young driver CRM training program in the ACT.

Young Drivers; Eve Mitsopoulos; Michael Regan; Janet Anderson; Paul Salmon; Jessica Edquist; Ii Report Documentation Page

2005-01-01T23:59:59.000Z

73

An extension of secure group communication using key graph  

Science Conference Proceedings (OSTI)

With the continuously emerging of Internet applications based on secure group communication, the design of secure group communication becomes an important Internet design topic. Group key management is important for secure group communication. Previous ... Keywords: Batch rekey, Group security, Key graph, Rekey

Zhang Jun; Zhou Yu; Ma Fanyuan; Gu Dawu; Bai Yingcai

2006-10-01T23:59:59.000Z

74

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81 - 9390 of 26,764 results. 81 - 9390 of 26,764 results. Download CX-004685: Categorical Exclusion Determination Centralized Cryptographic Key Management (CKMS) CX(s) Applied: A1, A9, A11, B1.2 Date: 12/07/2010 Location(s): West Lafayette, Indiana Office(s): Electricity Delivery and Energy Reliability, National Energy Technology Laboratory http://energy.gov/nepa/downloads/cx-004685-categorical-exclusion-determination Download CX-001457: Categorical Exclusion Determination Interconnection-Level Analysis and Planning for Texas Interconnect- Topic A CX(s) Applied: A9, A11 Date: 03/30/2010 Location(s): Austin, Texas Office(s): Electricity Delivery and Energy Reliability, National Energy Technology Laboratory http://energy.gov/nepa/downloads/cx-001457-categorical-exclusion-determination Download CX-006146: Categorical Exclusion Determination

75

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31 - 1840 of 28,560 results. 31 - 1840 of 28,560 results. Download CX-005126: Categorical Exclusion Determination Rural Electric Cooperative Geothermal Development Electric and Agriculture CX(s) Applied: A9, B3.1, B5.1, B5.12 Date: 01/27/2011 Location(s): Oregon Office(s): Energy Efficiency and Renewable Energy, Golden Field Office http://energy.gov/nepa/downloads/cx-005126-categorical-exclusion-determination Download CX-004685: Categorical Exclusion Determination Centralized Cryptographic Key Management (CKMS) CX(s) Applied: A1, A9, A11, B1.2 Date: 12/07/2010 Location(s): West Lafayette, Indiana Office(s): Electricity Delivery and Energy Reliability, National Energy Technology Laboratory http://energy.gov/nepa/downloads/cx-004685-categorical-exclusion-determination Download CX-004671: Categorical Exclusion Determination

76

Categorical Exclusion Determinations: National Energy Technology Laboratory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2010 8, 2010 CX-004665: Categorical Exclusion Determination On-Site Controlled Environment Agriculture Production of Biomass and Biofuels CX(s) Applied: A9, A11 Date: 12/08/2010 Location(s): Columbia, South Carolina Office(s): Energy Efficiency and Renewable Energy, National Energy Technology Laboratory December 8, 2010 CX-004664: Categorical Exclusion Determination On-Site Controlled Environment Agriculture Production of Biomass and Biofuels CX(s) Applied: B3.6 Date: 12/08/2010 Location(s): Tucson, Arizona Office(s): Energy Efficiency and Renewable Energy, National Energy Technology Laboratory December 7, 2010 CX-004687: Categorical Exclusion Determination Centralized Cryptographic Key Management (CKMS) CX(s) Applied: A1, A9, A11, B1.2 Date: 12/07/2010 Location(s): Oak Ridge, Tennessee

77

RFI Comments - Digital Management Inc.  

Science Conference Proceedings (OSTI)

... Lessons from energy, oil, gas, or any large manufacturing industry ... Enterprise Encryption Key and Digital Certificate Management Market Outlook. ...

2013-04-08T23:59:59.000Z

78

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and

79

Background on Quantum Key Distribution  

Science Conference Proceedings (OSTI)

... Background on Quantum Key Distribution. ... If someone, referred to by cryptographers as Eve, tries to eavesdrop on the transmission, she will not ...

2011-08-02T23:59:59.000Z

80

Partnership in key exchange protocols  

Science Conference Proceedings (OSTI)

In this paper, we investigate the notion of partnership as found in security models for key exchange protocols. Several different approaches have been pursued to define partnership, with varying degrees of success. We aim to provide an overview and criticism ... Keywords: key exchange, partnership, session identifier

Kazukuni Kobara; Seonghan Shin; Mario Strefler

2009-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Optimizing IT process management  

Science Conference Proceedings (OSTI)

In this paper, the author discusses some key concepts in IT process management. The paper also includes the recommendations in these following aspects: team organization, physical environment, project selection, politics, organizational communication, ... Keywords: IT process management

Tony Tony Lee

2010-07-01T23:59:59.000Z

82

Enabling decentralised management through federation  

Science Conference Proceedings (OSTI)

Cross-domain management is an increasingly important concern in network management and such management capability is a key-enabler of many emerging computing environments. This paper analyses the requirements for management systems that aim to support ... Keywords: Federation, Management, Policy-based management, Semantics, Telecommunications

Kevin Feeney; Rob Brennan; John Keeney; Hendrik Thomas; Dave Lewis; Aidan Boran; Declan O'Sullivan

2010-11-01T23:59:59.000Z

83

Key Activities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Activities Key Activities Key Activities The Water Power Program conducts work in four key areas at the forefront of water power research. The Program is structured to help the United States meet its growing energy demands sustainably and cost-effectively by developing innovative renewable water power technologies, breaking down market barriers to deployment, building the infrastructure to test new technologies, and assessing water power resources for integration into our nation's grid. Research and Development Introduce and advance new marine and hydrokinetic technologies to provide sustainable and cost-effective renewable energy from the nation's waves, tides, currents, and ocean thermal gradients. Research and develop innovative hydropower technologies to sustainably tap our country's diverse water resources including rivers,

84

Key China Energy Statistics 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

1 Title Key China Energy Statistics 2011 Publication Type Chart Year of Publication 2012 Authors Levine, Mark D., David Fridley, Hongyou Lu, and Cecilia Fino-Chen Date Published...

85

Key China Energy Statistics 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

2 Title Key China Energy Statistics 2012 Publication Type Chart Year of Publication 2012 Authors Levine, Mark D., David Fridley, Hongyou Lu, and Cecilia Fino-Chen Date Published...

86

EPAct Transportation Regulatory Activities: Key Terms  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Terms Key Terms to someone by E-mail Share EPAct Transportation Regulatory Activities: Key Terms on Facebook Tweet about EPAct Transportation Regulatory Activities: Key Terms on Twitter Bookmark EPAct Transportation Regulatory Activities: Key Terms on Google Bookmark EPAct Transportation Regulatory Activities: Key Terms on Delicious Rank EPAct Transportation Regulatory Activities: Key Terms on Digg Find More places to share EPAct Transportation Regulatory Activities: Key Terms on AddThis.com... Home About Covered Fleets Compliance Methods Alternative Fuel Petitions Resources Guidance Documents Statutes & Regulations Program Annual Reports Fact Sheets Newsletter Case Studies Workshops Tools Key Terms FAQs Key Terms The Energy Policy Act (EPAct) includes specific terminology related to

87

EPAct Transportation Regulatory Activities: Key Federal Statutes  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Key Federal Statutes to someone by E-mail Share EPAct Transportation Regulatory Activities: Key Federal Statutes on Facebook Tweet about EPAct Transportation Regulatory Activities: Key Federal Statutes on Twitter Bookmark EPAct Transportation Regulatory Activities: Key Federal Statutes on Google Bookmark EPAct Transportation Regulatory Activities: Key Federal Statutes on Delicious Rank EPAct Transportation Regulatory Activities: Key Federal Statutes on Digg Find More places to share EPAct Transportation Regulatory Activities: Key Federal Statutes on AddThis.com... Home About Contacts Covered Fleets Compliance Methods Alternative Fuel Petitions Resources Key Federal Statutes These are excerpts from federal statutes that established key Energy Policy Act (EPAct) transportation regulatory activities.

88

Key Blog Distillation: Ranking Aggregates  

E-Print Network (OSTI)

Macdonald,C. Ounis,I. In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, California, USA, October 26-30, 2008 ACM Press

Macdonald, C.; Ounis, I.

89

KIDS: keyed intrusion detection system  

Science Conference Proceedings (OSTI)

Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to mimic normal payload, and so avoid detection if the anomaly detection method ... Keywords: Kerckhoffs' principle, anomaly detection, keyed IDS, network intrusion detection, word model

Sasa Mrdovic; Branislava Drazenovic

2010-07-01T23:59:59.000Z

90

Key Workplace Documents Federal Publications  

E-Print Network (OSTI)

, the Administration in 2007 concluded agreements with China on toys, food and feed, drugs and medical devicesKey Workplace Documents Federal Publications Cornell University ILR School Year 2008 China/498 #12;Order Code RL33536 China-U.S. Trade Issues Updated March 7, 2008 Wayne M. Morrison Specialist

91

Key technology trends - Satellite systems  

Science Conference Proceedings (OSTI)

This paper is based on material extracted from the WTEC Panel Report Global Satellite Communications Technology and Systems, December 1998. It presents an overview of key technology trends in communications satellites in the last few years. After the ... Keywords: Communications satellites, Satellite communications, Satellite technology overview

Charles W. Bostian; William T. Brandon; Alfred U. Mac Rae; Christoph E. Mahle; Stephen A. Townes

2000-08-01T23:59:59.000Z

92

Risk Assessment and Risk Management/Mitigation  

Science Conference Proceedings (OSTI)

... Emergency Management Agency FEMP Federal Energy ... defines key terms, designates guidelines, and ... the many software products developed by ...

2007-10-03T23:59:59.000Z

93

Rotating Plasma Finding is Key for ITER  

NLE Websites -- All DOE Office Websites (Extended Search)

Plasma Finding is Key for ITER Rotating Plasma Finding is Key for ITER PlasmaTurbulenceCSChang.png Tokamak turbulence showing inward-propagating streamers from normalized...

94

Distributed Systems for Energy Management  

NLE Websites -- All DOE Office Websites (Extended Search)

buildings-to-grid, responsive loads, on-line monitoring of efficiency programs, microgrids, and other forms of distributed resource management. A key challenge will be the...

95

Vehicle Technologies Office: Key Activities in Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities in Key Activities in Vehicles to someone by E-mail Share Vehicle Technologies Office: Key Activities in Vehicles on Facebook Tweet about Vehicle Technologies Office: Key Activities in Vehicles on Twitter Bookmark Vehicle Technologies Office: Key Activities in Vehicles on Google Bookmark Vehicle Technologies Office: Key Activities in Vehicles on Delicious Rank Vehicle Technologies Office: Key Activities in Vehicles on Digg Find More places to share Vehicle Technologies Office: Key Activities in Vehicles on AddThis.com... Key Activities Mission, Vision, & Goals Plans, Implementation, & Results Organization & Contacts National Laboratories Budget Partnerships Key Activities in Vehicles We conduct work in four key areas to develop and deploy vehicle technologies that reduce the use of petroleum while maintaining or

96

Fuel Cell Technologies Office: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities to Key Activities to someone by E-mail Share Fuel Cell Technologies Office: Key Activities on Facebook Tweet about Fuel Cell Technologies Office: Key Activities on Twitter Bookmark Fuel Cell Technologies Office: Key Activities on Google Bookmark Fuel Cell Technologies Office: Key Activities on Delicious Rank Fuel Cell Technologies Office: Key Activities on Digg Find More places to share Fuel Cell Technologies Office: Key Activities on AddThis.com... Key Activities Plans, Implementation, & Results Accomplishments Organization Chart & Contacts Quick Links Hydrogen Production Hydrogen Delivery Hydrogen Storage Fuel Cells Technology Validation Manufacturing Codes & Standards Education Systems Analysis Contacts Key Activities The Fuel Cell Technologies Office conducts work in several key areas to

97

November 2012 Key Performance Indicator (KPI): Carbon Management  

E-Print Network (OSTI)

District Heating Scheme. This service meets all the heating requirements by combusting municipal waste statistics, to convert energy consumption data. The totals are calculated using electricity, gas and district heating scheme* data. Year Emissions (Tonnes CO2) % change from 2005/06 2005/2006 17,400 N/A 2006/2007 15

Evans, Paul

98

Cryptographic Key Managment Workshop 2012-SP 800-152 ...  

Science Conference Proceedings (OSTI)

... own sector profiles SP 800-152: Profile Requirements 3 ... Integrity is verified before loading into ... Page 37. SP 800-152: Profile Requirements 37 ...

2012-09-11T23:59:59.000Z

99

Cryptanalysis of two group key management protocols for secure multicast  

Science Conference Proceedings (OSTI)

Many emerging network applications are based upon group communication models and are implemented as either one-to-many or many-to-many multicast. As a result, providing multicast confidentiality is a critical networking issue and multicast security has ...

Wen Tao Zhu

2005-12-01T23:59:59.000Z

100

A timed-release key management scheme for backward recovery  

Science Conference Proceedings (OSTI)

The timed-release encryption scheme is to encrypt a message so that a ciphertext can be decrypted when specific time in the future comes. Recently, interesting constructions of the timed-release encryption scheme have been proposed. The central concept ...

Maki Yoshida; Shigeo Mitsunari; Toru Fujiwara

2005-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Algorithms for dynamic multicast key distribution  

Science Conference Proceedings (OSTI)

We study the problem of multicast key distribution for group security. Secure group communication systems typically rely on a group key, which is a secret shared among the members of the group. This key is used to provide privacy by encrypting all group ... Keywords: Dynamic key distribution, experimental algorithms, multicast

Justin Goshi; Richard E. Ladner

2007-02-01T23:59:59.000Z

102

Multiparty quantum key agreement with single particles  

Science Conference Proceedings (OSTI)

Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. ... Keywords: Quantum cryptography, Quantum information, Quantum key agreement

Bin Liu; Fei Gao; Wei Huang; Qiao-Yan Wen

2013-04-01T23:59:59.000Z

103

Alternative Fuels Data Center: Key Federal Legislation  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Key Federal Key Federal Legislation to someone by E-mail Share Alternative Fuels Data Center: Key Federal Legislation on Facebook Tweet about Alternative Fuels Data Center: Key Federal Legislation on Twitter Bookmark Alternative Fuels Data Center: Key Federal Legislation on Google Bookmark Alternative Fuels Data Center: Key Federal Legislation on Delicious Rank Alternative Fuels Data Center: Key Federal Legislation on Digg Find More places to share Alternative Fuels Data Center: Key Federal Legislation on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Key Federal Legislation The information below includes a brief chronology and summaries of key federal legislation related to alternative fuels and vehicles, air quality,

104

SunShot Initiative: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities Key Activities Printable Version Share this resource Send a link to SunShot Initiative: Key Activities to someone by E-mail Share SunShot Initiative: Key Activities on Facebook Tweet about SunShot Initiative: Key Activities on Twitter Bookmark SunShot Initiative: Key Activities on Google Bookmark SunShot Initiative: Key Activities on Delicious Rank SunShot Initiative: Key Activities on Digg Find More places to share SunShot Initiative: Key Activities on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Key Activities Under the SunShot Initiative, the DOE Solar Office issues competitive solicitations that fund selective research projects aimed at transforming the ways the United States generates, stores, and utilizes solar energy.

105

Renewable Energy Community: Key Elements  

NLE Websites -- All DOE Office Websites (Extended Search)

of Energy of Energy Office of Energy Efficiency & Renewable Energy National Renewable Energy Laboratory Innovation for Our Energy Future A Renewable Energy Community: Key Elements A reinvented community to meet untapped customer needs for shelter and transportation with minimal environmental impacts, stable energy costs, and a sense of belonging N. Carlisle, J. Elling, and T. Penney Technical Report NREL/TP-540-42774 January 2008 NREL is operated by Midwest Research Institute ● Battelle Contract No. DE-AC36-99-GO10337 National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov Operated for the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy by Midwest Research Institute * Battelle

106

Asset Management Best Practices  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) has conducted a series of surveys on the status of the implementation of power delivery asset management and the maintenance of key substation components. The results will assist utilities in determining how to best adapt or adopt the principles of asset management in their organizations. This technical update presents the results of surveys covering organizational and technical aspects of asset management, including detailed questions on the management of pow...

2010-12-23T23:59:59.000Z

107

Answering Key Fuel Cycle Questions  

Science Conference Proceedings (OSTI)

The Advanced Fuel Cycle Initiative (AFCI) program has both outcome and process goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the energy future. Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: What are the AFCI program goals? Which potential waste disposition approaches do we plan for? What are the major separations, transmutation, and fuel options? How do we address proliferation resistance? Which potential energy futures do we plan for? What potential external triggers do we plan for? Should we separate uranium? If we separate uranium, should we recycle it, store it or dispose of it? Is it practical to plan to fabricate and handle hot fuel? Which transuranic elements (TRU) should be separated and transmuted? Of those TRU separated, which should be transmuted together? Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? Should we separate and/or transmute very long-lived Tc and I isotopes? Which separation technology? What mix of transmutation technologies? What fuel technology best supports the above decisions?

Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

2003-10-01T23:59:59.000Z

108

Turn Your Key, Be Idle Free | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes gasoline, costs money, produces pollutants, and yet doesn't get you anywhere? Idling! And yet, every year, Americans waste 3 billion gallons of fuel by idling their vehicles. Idling is running a vehicle any time that it's not moving. In this condition, the car's fuel economy is exactly zero miles per gallon. Although many people think that restarting the engine too often will wear out the starter, that idea is just an "old husband's tale." In fact, idling places unnecessary wear-and-tear on the engine, and many manufacturers discourage it. Although drivers can't avoid some amount of idling, such as being stuck in

109

California Santa Cruz THREAT MANAGEMENT  

E-Print Network (OSTI)

University of California Santa Cruz THREAT MANAGEMENT Personal Safety Handbook UCSC Police www2 Department Safety Handbook - 15 - #12;Any supervisor, manager, or other person in authority who receives the key to maintenance or delivery people. Don't hide a key outdoors; burglars know all the hiding places

California at Santa Cruz, University of

110

On multi-column foreign key discovery  

Science Conference Proceedings (OSTI)

A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is a crucial step in understanding and working with the data. Nevertheless, ...

Meihui Zhang; Marios Hadjieleftheriou; Beng Chin Ooi; Cecilia M. Procopiuc; Divesh Srivastava

2010-09-01T23:59:59.000Z

111

Group-Based Authentication and Key Agreement  

Science Conference Proceedings (OSTI)

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes ... Keywords: Authentication and key agreement, Group key, Roaming, Security, Wireless network

Yu-Wen Chen; Jui-Tang Wang; Kuang-Hui Chi; Chien-Chao Tseng

2012-02-01T23:59:59.000Z

112

The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.  

SciTech Connect

Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

2010-09-01T23:59:59.000Z

113

DOE Office of Environmental Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Management Environmental Management Project and Contract Management Improvement Timeline Improving DOE contract and project management is a top priority of the Department's senior management and entire organization. The DOE Office of Environmental Management (EM) has put in place a "Roadmap" for Journey to Excellence that sets specific performance expectations for continuous improvements in contract and project management. Following are some highlights of EM's improvement actions over the past five years. In 2006, the National Academy of Public Administration (NAPA) began a study of EM, which included acquisition and project management among its key focus areas. The resultant report from the study,

114

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

115

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ?ABE. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate, i.e., the number of key bits that can be extracted per copy of ?ABE. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eves side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eves memory are important in order to determine the correct security threshold in QKD. 1

Matthias Christ; Renato Renner

2008-01-01T23:59:59.000Z

116

MANAGEMENT SUMMARY  

E-Print Network (OSTI)

need to effectively manage business performance. This has never been more true than in todays complex, highly regulated and confusing business environment which requires better decisions and improved execution now! In spite of the billions of dollars invested in infor-mation technology to address these challenges, managers and executives in many organizations still make key decisions underpinned by their own personal versions of documents and spread-sheets. Their organization struggles to provide a seamless flow of trusted information between customers, suppliers and their employees. The result is that most organizations cannot provide their people with the right information at the right time, and in attempting to do so are committing significant resources to compiling and auditing numbers instead of using them to inform the business. Consequently, they are far more reac-tive than proactive and ultimately they are not efficiently and effectively managing their current and future performance. Leading organizations are investing in managing information and developing predictive insights to drive sustainable business results. These com-panies have become masters in Performance Management- going beyond mere users of business intelligence to become the Intelligent Enterprises. ...a new breed of company is upping the stakes....have dominated their fields by deploy-ing industrial-strength analytics across a wide variety of activities. In essence, they are trans-forming their organiza-tions into armies of killer apps and crunching their way to victory.

unknown authors

2006-01-01T23:59:59.000Z

117

New Quantum Key System Combines Speed, Distance  

Science Conference Proceedings (OSTI)

... a prototype high-speed quantum key distribution (QKD) system ... a theoretically unbreakable one-time pad encryption, transmission and decryption ...

2013-07-08T23:59:59.000Z

118

Nanomechanics: New Test Measures Key Properties of ...  

Science Conference Proceedings (OSTI)

Nanomechanics: New Test Measures Key Properties of ... Tests using the wrinkle-crack method, however, show ... to the longest duration tested, 10 days ...

2012-10-18T23:59:59.000Z

119

CODATA Key Values for Thermodynamics - TMS  

Science Conference Proceedings (OSTI)

Feb 8, 2007 ... This site includes internationally agreed upon values for thermodynamic properties of key chemical substances established by the Committee...

120

Design and Analysis of Key Comparisons  

Science Conference Proceedings (OSTI)

... new methods, and make statistically best practices available ... to Key Comparisons such as data reporting and ... In the big picture, with the lowering ...

2010-11-18T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Quantum key distribution network with wavelength addressing  

E-Print Network (OSTI)

Most traditional applications of quantum cryptography are point-to-point communications, in which only two users can exchange keys. In this letter, we present a network scheme that enable quantum key distribution between multi-user with wavelength addressing. Considering the current state of wavelength division multiplexing technique, dozens or hundreds of users can be connected to such a network and directly exchange keys with each other. With the scheme, a 4-user demonstration network was built up and key exchanges were performed.

Mo, X F; Han, Z F; Xu, F X; Zhang, T; Guo, Guang-Can; Han, Zheng-Fu; Mo, Xiao-Fan; Xu, Fang-Xing; Zhang, Tao

2006-01-01T23:59:59.000Z

122

Schedules of Key Environmental Impact Statements  

Energy.gov (U.S. Department of Energy (DOE))

This document graphically displays the milestone dates and projected schedules of key Environmental Impact Statements (updated monthly).This chart represents anticipated activity and is not a...

123

BIASED RANDOM-KEY GENETIC ALGORITHMS WITH ...  

E-Print Network (OSTI)

Handbook of Metaheuristics. Kluwer. Academic Publishers, 2003. J.F. Gonalves and M.G.C. Resende. Biased random-key genetic algorithms for combinatorial...

124

Two key questions about color superconductivity.  

E-Print Network (OSTI)

??We pose two key questions about color superconductivity: What are the effects of the large strange quark mass, and what are the observable consequences of (more)

Kundu, Joydip, 1977-

2004-01-01T23:59:59.000Z

125

Comment on "Quantum dense key distribution"  

E-Print Network (OSTI)

In this Comment we question the security of recently proposed by Degiovanni et al. [Phys. Rev. A 69 (2004) 032310] scheme of quantum dense key distribution.

Antoni Wojcik

2004-05-07T23:59:59.000Z

126

Identity-based authenticated asymmetric group key agreement protocol  

Science Conference Proceedings (OSTI)

In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key ... Keywords: asymmetric group key agreement, bilinear map, group key agreement, identity-based public-key cryptography

Lei Zhang; Qianhong Wu; Bo Qin; Josep Domingo-Ferrer

2010-07-01T23:59:59.000Z

127

KeyTex Energy LLC | Open Energy Information  

Open Energy Info (EERE)

KeyTex Energy LLC KeyTex Energy LLC Jump to: navigation, search Name KeyTex Energy LLC Place Greensburg, Pennsylvania Zip 15601 Product KeyTex Energy is a full service energy and consulting company, helping businesses implement both wholesale and retail strategies to control and reduce energy costs as well as manage the risks and complexities associated with the energy markets. Coordinates 40.299245°, -79.543159° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.299245,"lon":-79.543159,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

128

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

2006-08-25T23:59:59.000Z

129

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2, 2011 - 9:20pm August 2, 2011 - 9:20pm Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Ashton B. Carter - Nominee for Deputy Secretary of Defense, Department of Defense I. Charles McCullough III - Inspector General of the Intelligence Community, Office of the Director of National Intelligence Ernest Mitchell, Jr. - Administrator, United States Fire Administration, Federal Emergency Management Agency, Department of Homeland Security Nancy M. Ware - Director, Court Services and Offender Supervision Agency for the District of Columbia Gregory H. Woods - General Counsel, Department of Energy The President also announced his intent to appoint the following individuals to key Administration posts:

130

General quantum key distribution in higher dimension  

E-Print Network (OSTI)

We study a general quantum key distribution protocol in higher dimension. In this protocol, quantum states in arbitrary g+1 (1?g?d) out of all d+1 mutually unbiased bases in a d-dimensional system can be used for the key ...

Shi, Han-Duo

131

Robust key extraction from physical uncloneable functions  

Science Conference Proceedings (OSTI)

Physical Uncloneable Functions (PUFs) can be used as a cost-effective means to store key material in an uncloneable way. Due to the fact that the key material is obtained by performing measurements on a physical system, noise is inevitably present in ... Keywords: authentication, challenge-response pair, error correction, noise, physical uncloneable function, speckle pattern

B. kori?; P. Tuyls; W. Ophey

2005-06-01T23:59:59.000Z

132

General model of quantum key distribution  

E-Print Network (OSTI)

A general mathematical framework for quantum key distribution based on the concepts of quantum channel and Turing machine is suggested. The security for its special case is proved. The assumption is that the adversary can perform only individual (in essence, classical) attacks. For this case an advantage of quantum key distribution over classical one is shown.

A. S. Trushechkin; I. V. Volovich

2005-04-20T23:59:59.000Z

133

Fuel Cell Technologies Office: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities Key Activities The Fuel Cell Technologies Office conducts work in several key areas to advance the development and commercialization of hydrogen and fuel cell technologies. Research, Development, and Demonstration Key areas of research, development, and demonstration (RD&D) include the following: Fuel Cell R&D, which seeks to improve the durability, reduce the cost, and improve the performance of fuel cell systems, through advances in fuel cell stack and balance of plant components Hydrogen Fuel R&D, which focuses on enabling the production of low-cost hydrogen fuel from diverse renewable pathways and addressing key challenges to hydrogen delivery and storage Manufacturing R&D, which works to develop and demonstrate advanced manufacturing technologies and processes that will reduce the cost of fuel cell systems and hydrogen technologies

134

residential sector key indicators | OpenEI  

Open Energy Info (EERE)

residential sector key indicators residential sector key indicators Dataset Summary Description This dataset is the 2009 United States Residential Sector Key Indicators and Consumption, part of the Source EIA Date Released March 01st, 2009 (5 years ago) Date Updated Unknown Keywords AEO consumption EIA energy residential sector key indicators Data application/vnd.ms-excel icon 2009 Residential Sector Key Indicators and Consumption (xls, 55.3 KiB) Quality Metrics Level of Review Peer Reviewed Comment Temporal and Spatial Coverage Frequency Annually Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL) Comment http://www.eia.gov/abouteia/copyrights_reuse.cfm Rate this dataset Usefulness of the metadata Average vote Your vote Usefulness of the dataset Average vote Your vote

135

Product management in software as a service  

E-Print Network (OSTI)

Software product management within Software as a Service is key domain of interest given the recent advances in Cloud Computing. This thesis explores the product management challenges within this domain. It makes a ...

Rajasekharan, Karthikeyan

2012-01-01T23:59:59.000Z

136

Captured key electrical safety lockout system  

DOE Patents (OSTI)

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

Darimont, Daniel E. (Aurora, IL)

1995-01-01T23:59:59.000Z

137

Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions  

Science Conference Proceedings (OSTI)

Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed ... Keywords: Fuzzy extractor, Helper data algorithm, Intrinsic PUF, Key distribution, LC-PUFs, Physical unclonable functions, SRAMs, Sensor nodes

Jorge Guajardo; Boris kori?; Pim Tuyls; Sandeep S. Kumar; Thijs Bel; Antoon H. Blom; Geert-Jan Schrijen

2009-03-01T23:59:59.000Z

138

Password based key exchange with mutual authentication  

Science Conference Proceedings (OSTI)

A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [17] and later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication ...

Shaoquan Jiang; Guang Gong

2004-08-01T23:59:59.000Z

139

Two key questions about color superconductivity  

E-Print Network (OSTI)

We pose two key questions about color superconductivity: What are the effects of the large strange quark mass, and what are the observable consequences of color superconductivity? Motivated by the first question, we study ...

Kundu, Joydip, 1977-

2004-01-01T23:59:59.000Z

140

Jurisdiction Members Contact Info Key Staffers  

E-Print Network (OSTI)

Relevant Jurisdiction Members Contact Info Key Staffers House Science, Space, and Technology, aeronautics, civil aviation, environment, and marine science · America COMPETES · Energy labs · National Science Foundation, including NCAR · National Aeronautics and Space Administration · National Weather

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Quantum Key Distribution Using Quantum Faraday Rotators  

E-Print Network (OSTI)

We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of the Faraday rotators. The protocol is unconditionally secure against eavesdropping for single-photon source on a noisy environment and robust against impersonation attacks. It also allows for unconditionally secure key distribution for multiphoton source up to two photons. The protocol could be implemented experimentally with the current spintronics technology on semiconductors.

Choi, T; Choi, Mahn-Soo; Choi, Taeseung

2006-01-01T23:59:59.000Z

142

Multipartite secret key distillation and bound entanglement  

Science Conference Proceedings (OSTI)

Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

2009-10-15T23:59:59.000Z

143

High Efficient Secret Key Distillation for Long Distance Continuous Variable Quantum Key Distribution  

E-Print Network (OSTI)

The continuous variable quantum key distribution is expected to provide high secret key rate without single photon source and detector, but the lack of the secure and effective key distillation method makes it unpractical. Here, we present a secure single-bit-reverse-reconciliation protocol combined with secret information concentration and post-selection, which can distill the secret key with high efficiency and low computational complexity. The simulation results show that this protocol can provide high secret key rate even when the transmission fiber is longer than 150km, which may make the continuous variable scheme to outvie the single photon one.

Yi-bo Zhao; Zheng-fu Han; Jin-jian Chen; You-zhen Gui; Guang-can Guo

2006-03-08T23:59:59.000Z

144

Generating Electricity with your Steam System: Keys to Long Term Savings  

E-Print Network (OSTI)

The application of combined heat and power principals to existing plant steam systems can help produce electricity at more than twice efficiency of grid generated electricity. In this way, steam plant managers can realize substantial savings with relatively quick payback of capital. Carefully planned and executed projects are the key to unlocking the maximum value of generating electricity from an existing steam system. This paper illustrates the key concepts of generating onsite power with backpressure steam turbine generators along with practical considerations.

Bullock, B.; Downing, A.

2010-01-01T23:59:59.000Z

145

Defense acquisition program manager as program leader : improving program outcomes through key competencies and relationship management  

E-Print Network (OSTI)

The US defense acquisition system is a massive enterprise charged with developing and acquiring state-of-the-art military technology and systems. For the past 65 years, many broad-reaching studies and commissions have ...

Baumann, B. Marc

2013-01-01T23:59:59.000Z

146

NIST Special Publication 800-57, Recommendation for Key ...  

Science Conference Proceedings (OSTI)

... keying material from key backup or archive. ... term random number generator (RNG) is ... Deterministic Random Bit Generators (DRBGs), sometimes ...

2012-07-10T23:59:59.000Z

147

ITL Bulletin Generating Secure Cryptographic Keys: A Critical ...  

Science Conference Proceedings (OSTI)

... KEYS: A CRITICAL COMPONENT OF CRYPTOGRAPHIC ... relies upon two basic components: an algorithm (or ... and of keys for symmetric algorithms. ...

2013-04-16T23:59:59.000Z

148

Conservation strategies in the Florida keys: formula for success  

E-Print Network (OSTI)

Transportation, Environmental Management Office, Miami, FLState Environmental Management Office, 605 Suwannee Street -s District Environmental Management Office in Miami, where

Lop, Roel ez R.; Silvy, Nova. J.; Owen, Catherine B.; Irwin, C. Leroy

2003-01-01T23:59:59.000Z

149

A secure multiple-agent cryptographic key recovery system  

Science Conference Proceedings (OSTI)

Symmetric cryptography uses the same session key for message encryption and decryption. Without having it, the encrypted message will never be revealed. In case the session key is unavailable or government authorities need to inspect suspect messages, ... Keywords: key recovery, key recovery agent, key recovery center, secret sharing, session key

Kanokwan Kanyamee; Chanboon Sathitwiriyawong

2009-08-01T23:59:59.000Z

150

Public key infrastructure for DOE security research  

SciTech Connect

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

151

Nonorthogonal decoy-state Quantum Key Distribution  

E-Print Network (OSTI)

In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and heavy loss in transmission line. Decoy states method and nonorthogonal encoding protocol are two important weapons to combat these effects. Here, we combine these two methods and propose a efficient method that can substantially improve the performance of QKD. We find a 79 km increase in transmission distance over the prior record using decoy states method.

Li, J B; Li, Jing-Bo; Fang, Xi-Ming

2005-01-01T23:59:59.000Z

152

Complementarity, distillable secret key, and distillable entanglement  

E-Print Network (OSTI)

We consider controllability of two conjugate observables Z and X by two parties with classical communication. The ability is specified by two alternative tasks, (i) agreement on Z and (ii) preparation of an eigenstate of X with use of an extra communication channel. We prove that their feasibility is equivalent to that of key distillation if the extra channel is quantum, and to that of entanglement distillation if it is classical. This clarifies the distinction between two entanglement measures, distillable key and distillable entanglement.

Masato Koashi

2007-04-27T23:59:59.000Z

153

Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate  

E-Print Network (OSTI)

We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bru

2013-03-14T23:59:59.000Z

154

Basics about CIM technology and key  

E-Print Network (OSTI)

Basics about CIM® technology and key applications Ales Strancar March, 2011 #12;Leaders in Monolith monolithic technology (CIM®). 4 USA patents granted including their foreign equivalents, more pending. #12;Important Milestones · 2002: First Drug Master File (DMF) for CIM® DEAE supports. · 2002: Pass first FDA

Lebendiker, Mario

155

Key issues of RFID reader network system  

Science Conference Proceedings (OSTI)

RFID system is used widely in different applications and comes in a myriad of forms today. It is doomed to be concerned by people and still be the hot spot of research in the next few years. In this paper, Key issues of RFID reader network system are ... Keywords: RFID, WSN, anti-collision algorithm, taxonomy

Leian Liu; Dashun yan; Jiapei Wu; Hongjiang Wang

2009-09-01T23:59:59.000Z

156

Management Plan Management Plan  

E-Print Network (OSTI)

of a coevolving naturalcultural system. Suitable ecosystem attributes can be achieved by managing human maintenance that protects the riparian corridor. · Manage recreational use to protect riparian values Creek and the Warm Springs River during runoff periods. · Road systems and upland management practices

157

Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure  

Science Conference Proceedings (OSTI)

Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in Certificate Authorities (CAs), resilience against attacks, communication overhead (bandwidth and latency) for setting up an SSL/TLS connection, and availability ... Keywords: accountability, certificate validation, public log servers, public-key infrastructure, ssl, tls

Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perring, Collin Jackson, Virgil Gligor

2013-05-01T23:59:59.000Z

158

Evaluation of a highway improvement project on Florida key deer  

E-Print Network (OSTI)

Transportation, Environmental Management Office, Miami, FLs District Environmental Management Office in Miami, where

2005-01-01T23:59:59.000Z

159

A new class of Hash-Chain based key pre-distribution schemes for WSN  

Science Conference Proceedings (OSTI)

In the last decade, we witness a proliferation of potential application domains of wireless sensor networks (WSN). Therefore, a host of research works have been conducted by both academic and industrial communities. Nevertheless, given the sensitivity ... Keywords: Key management, Resilience, Security, Wireless sensor networks

Walid Bechkit; Yacine Challal; Abdelmadjid Bouabdallah

2013-02-01T23:59:59.000Z

160

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 17, 2009 - 12:00am April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and Urban Development; Raymond M. Jefferson, Assistant Secretary for Veterans Employment and Training, Department of Labor; Robert S. Litt, General

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Leakage resilient strong key-insulated signatures in public channel  

Science Conference Proceedings (OSTI)

Key-insulation aims at minimizing (i.e., compartmentalizing) the damage of users from key exposures, and traditionally requires a private channel of communication between a user and a semi-trusted party called a helper to refresh the private keys. The ... Keywords: continual key leakage, key-insulation, public channel, signatures

Le Trieu Phong; Shin'ichiro Matsuo; Moti Yung

2010-12-01T23:59:59.000Z

162

Practical Decoy State for Quantum Key Distribution  

E-Print Network (OSTI)

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution. Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states--the vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.

X. Ma; B. Qi; Y. Zhao; H. -K. Lo

2005-03-01T23:59:59.000Z

163

Key Facts: Solyndra Solar | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Key Facts: Solyndra Solar Key Facts: Solyndra Solar On September 1, 2011, Solyndra, a solar energy start-up and recipient of an Energy Department loan guarantee, declared bankruptcy. While this event is deeply disappointing, at the time the loan guarantee was issued, Solyndra was widely seen as a promising and innovative company: Solyndra was named one of the world's "50 Most Innovative Companies" in 2010 by MIT's Technology Review and included in the Wall Street Journal's "The Next Big Thing: Top 50 Venture Backed Companies." Private investors, after conducting their own careful review of Solyndra, put $1 billion of their own private capital behind the company. Solyndra reported sales growth of 40% from 2009 to 2010, from $100

164

Key Physical Mechanisms in Nanostructured Solar Cells  

DOE Green Energy (OSTI)

The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

Dr Stephan Bremner

2010-07-21T23:59:59.000Z

165

Risk Management RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Risk Management Review Module Risk Management Review Module March 2010 CD-0 O 0 OFFICE OF C CD-1 F ENVIRO Standard R Risk M Rev Critical Decis CD-2 M ONMENTAL Review Plan Managem view Module sion (CD) Ap CD March 2010 L MANAGE (SRP) ment e pplicability D-3 EMENT CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-1189-2008, Integration of Safety into the Design Process, and EM's internal

166

Method for encryption and transmission of digital keying data  

DOE Patents (OSTI)

A method for the encryption, transmission, and subsequent decryption of digital keying data. The method utilizes the Data Encryption Standard and is implemented by means of a pair of apparatus, each of which is selectable to operate as either a master unit or remote unit. Each unit contains a set of key encryption keys which are indexed by a common indexing system. The master unit operates upon command from the remote unit to generate a data encryption key and encrypt the data encryption key using a preselected key encryption key. The encrypted data encryption key and an index designator are then downloaded to the remote unit, where the data encryption key is decrypted for subsequent use in the encryption and transmission data. Downloading of the encrypted data encryption key enables frequent change of keys without requiring manual entry or storage of keys at the remote unit.

Mniszewski, Susan M. (Los Alamos, NM); Springer, Edward A. (Los Alamos, NM); Brenner, David P. (North Collins, NY)

1988-01-01T23:59:59.000Z

167

2 Key Problem Features Dynamic Decisions  

E-Print Network (OSTI)

Refineries: Real option to convert a set of inputs into a different set of outputs Natural gas storage: Real option to convert natural gas at the injection time to natural gas at the withdrawal time How do we optimally manage the available real optionality?

Selvaprabu (selva Nadarajah; Joint Work Franois Margot; Nicola Secom

2013-01-01T23:59:59.000Z

168

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

3MS Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs AN L-934 Surveillance of Site A and Plot M...

169

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs AN L-9213 Surveillance of Site A and Plot M Report...

170

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

r Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs ANL-949 Surveillance of Site A and Plot M Report...

171

Building Technologies Office: Key Activities in Energy Efficiency  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Efficiency to someone by E-mail Share Building Technologies Office: Key Activities in Energy Efficiency on Facebook Tweet about Building Technologies Office: Key Activities...

172

Energy: Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy: Critical Infrastructure and Key...

173

Energy Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy Critical Infrastructure and Key...

174

NERSC Played Key Role in Nobel Laureate's Discovery  

NLE Websites -- All DOE Office Websites (Extended Search)

Played Key Role in Nobel Laureate's Discovery NERSC Played Key Role in Nobel Laureate's Discovery NERSC, Berkeley Lab Now Centers for Computational Cosmology Community October 4,...

175

TEC Working Group Topic Groups Rail Key Documents Planning Subgroup...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Rail Key Documents Planning Subgroup TEC Working Group Topic Groups Rail Key Documents Planning Subgroup Planning Subgroup Rail Planning Timeline Benchmarking Project: AREVA Trip...

176

Single, Key Gene Discovery Could Streamline Production of Biofuels...  

NLE Websites -- All DOE Office Websites (Extended Search)

Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

177

Vehicle Electrification is Key to Reducing Petroleum Dependency...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas Emission Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas...

178

Technology Key to Harnessing Natural Gas Potential | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa Energy...

179

Key Renewable Energy Opportunities for Oklahoma Tribes | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Renewable Energy Opportunities for Oklahoma Tribes Key Renewable Energy Opportunities for Oklahoma Tribes August 13, 2012 Oklahoma City, Oklahoma Cox Convention Center The...

180

Updated distribution and reintroduction of the Lower Keys marsh rabbit  

E-Print Network (OSTI)

Listed as federally-endangered in 1990, the Lower Keys marsh rabbit (LKMR, Sylvilagus palustris hefneri) exists as a metapopulation in patches of wetland habitat in Florida?s Lower Keys. This study sought to address 2 priority actions identified by the LKMR Recovery Team: (1) monitoring of populations and (2) reintroduction. Monitoring the distribution and status of LKMR populations is critical for targeting future management actions. Informal transects for rabbit fecal pellets were used to survey habitat patches documented in1988?1995 surveys and to identify additional patches of occupied and potential habitat. Next, a buffer was created around patches to help managers account for uncertainty in rabbit movements and to identify groups of patches that might function as local populations. Surveys included 228 patches of occupied and potential habitat, 102 of which were occupied by rabbits. Patches were arranged in 56 occupied and 88 potential populations. Surveys revealed new patches of both occupied and potential habitat. Considering only areas included in 1988?1995 surveys, however, revealed a net decrease in the number of occupied patches. Many of the recently extirpated populations, which tended to occupy the periphery of larger islands or small neighboring islands, were unlikely to be recolonized without human intervention. Reintroduction provides a means of artificially recolonizing potential habitat. Two pilot reintroductions were conducted to evaluate this conservation strategy for the species. The second reintroduction was postponed, but the first effort met all criteria for short-term success, including survival comparable to a control group, fidelity to release sites, and evidence of reproduction. There are a limited number of potential source populations for translocations. Future efforts should consider using in-situ captive breeding to prevent potential long-term impacts to these populations. Few potential release sites exhibited suitable habitat quality and landscape context. Thus, for reintroduction to be more widely-applied for this species, it must be part of a comprehensive management plan involving land acquisition, control of secondary impacts from development, and habitat restoration and enhancement.

Faulhaber, Craig Alan

2003-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Quantum Key Distribution Highly Sensitive to Eavesdropping  

E-Print Network (OSTI)

We introduce a new quantum key distribution protocol that uses d-level quantum systems to encode an alphabet with c letters. It has the property that the error rate introduced by an intercept-and-resend attack tends to one as the numbers c and d increase. In dimension d=2, when the legitimate parties use a complete set of three mutually unbiased bases, the protocol achieves a quantum bit error rate of 57.1%. This represents a significant improvement over the 25% quantum bit error rate achieved in the BB84 protocol or 33% in the six-state protocol.

Brierley, Stephen

2009-01-01T23:59:59.000Z

182

Quantum Key Distribution Highly Sensitive to Eavesdropping  

E-Print Network (OSTI)

We introduce a new quantum key distribution protocol that uses d-level quantum systems to encode an alphabet with c letters. It has the property that the error rate introduced by an intercept-and-resend attack tends to one as the numbers c and d increase. In dimension d=2, when the legitimate parties use a complete set of three mutually unbiased bases, the protocol achieves a quantum bit error rate of 57.1%. This represents a significant improvement over the 25% quantum bit error rate achieved in the BB84 protocol or 33% in the six-state protocol.

Stephen Brierley

2009-10-14T23:59:59.000Z

183

Many-core key-value store  

Science Conference Proceedings (OSTI)

Scaling data centers to handle task-parallel work-loads requires balancing the cost of hardware, operations, and power. Low-power, low-core-count servers reduce costs in one of these dimensions, but may require additional nodes to provide the required ... Keywords: 64-core Tilera TILEPro64, many-core key-value store, data centers, task-parallel workloads, low-core-count servers, low-power servers, under-utilizing memory, power consumption, high-core-count processor, clock rate, 4-core Intel Xeon L5520, 8-core AMD Opteron 6128 HE

M. Berezecki; E. Frachtenberg; M. Paleczny; K. Steele

2011-07-01T23:59:59.000Z

184

On The Design and Implementation of a Home Energy Management System  

E-Print Network (OSTI)

energy management at home is key and an integral part of the future Smart Grid. In this paper, we present the key issues of home energy management in Smart Grid: a holistic management solution, improved device energy management and show the results in simulation studies. Index Terms--smart grid, home energy

Boutaba, Raouf

185

Analysis and design of a secure key exchange scheme  

Science Conference Proceedings (OSTI)

We propose a new key exchange scheme where the secret key is obtained by multiplying the powers of block upper triangular matrices. After studying the cryptographic properties of these block matrices, the theoretical aspects of this scheme are analyzed, ... Keywords: Block matrices, Cryptography, Discrete logarithm problem, Key exchange scheme, Public key, Quick exponentiation, Security, Triangular matrices

Rafael lvarez; Leandro Tortosa; Jos-Fco Vicent; Antonio Zamora

2009-05-01T23:59:59.000Z

186

Vehicle Technologies Office: Key Activities in Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

Activities in Vehicles Activities in Vehicles We conduct work in four key areas to develop and deploy vehicle technologies that reduce the use of petroleum while maintaining or improving performance, power, and comfort. Research and development (R&D); testing and analysis; government and community stakeholder support; and education help people access and use efficient, clean vehicles that meet their transportation needs. Researcher loads a sample mount of battery cathode materials for X-ray diffraction, an analysis tool for obtaining information on the crystallographic structure and composition of materials. Research and Development of New Technologies Develop durable and affordable advanced batteries as well as other forms of energy storage. Improve the efficiency of combustion engines.

187

Key Renewable Energy Opportunities for Oklahoma Tribes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TRIBAL LEADER FORUM SERIES TRIBAL LEADER FORUM SERIES KEY RENEWABLE ENERGY OPPORTUNITIES FOR OKLAHOMA TRIBES August 13, 2012 COX CONVENTION CENTER 100 West Sheridan Avenue, Oklahoma City, OK 73102 (405) 602-8500 The fifth in a series of planned U.S. DOE Office of Indian Energy-sponsored strategic energy development & investment forums, this forum is designed to give Oklahoma tribal leaders the opportunity to receive the latest updates on DOE's energy development efforts in Indian Country. The Forum will provide a venue for tribal leaders to discuss best practices in renewable energy development, including project development and finance, issues related to Oklahoma land ownership, and energy planning and energy markets. Tribal leaders will also have the opportunity to directly converse with each other by participating in a roundtable

188

Toolpusher is key to efficient rig operation  

Science Conference Proceedings (OSTI)

Toolpushers earn a higher salary, control more personnel, and are responsible for a more expensive operation than many graduate MBAs. As a result, toolpushers are key to improved rig efficiencies and reduced crew turnover. For example, by having its toolpushers in Libya implement a new managerial approach, Santa Fe Drilling Co. reduced labor turnover 30%, reduced the number of lost-time accidents 58%, and increased average rig inspection scores 6%. During the boom years of drilling, toolpushers complained often about the poor quality of roustabouts and roughnecks assigned to them. Many toolpushers held poor screening of personnel responsible, and felt justified in firing those who were slow to adapt. Few of them considered that they were directly responsible. Today's toolpusher must realize that he is responsible not only for the rig, its maintenance, and its drilling performance, but for training and development of the rig's personnel as well.

Fortney, K.

1983-09-01T23:59:59.000Z

189

Key decisions near for Chad pipeline proposal  

Science Conference Proceedings (OSTI)

The World Bank is expected to play a key role in a proposed $3 billion development of oil fields in Chad and an export pipeline through Cameroon to the Atlantic Ocean. The project, which has been at least 4 years in the making, could see a breakthrough later this year. Esso Exploration and production Chad Inc. is operator for the consortium proposing the project. It holds a 40% interest, Ste. Shell Tchadienne de Recherches et d`Exploitation has 40%, and Elf Hydrocarbures Tchad has a 20% share it purchased from Chevron Corp. in 1993 (OGJ, February 1, 1993, p 25). The governments of Chad and Cameroon, which had approved a framework agreement for the pipeline in 1995, now are studying an assessment of the pipeline`s environmental impact. If they approve the plans, they are expected to apply to the World Bank for financing. The paper describes the Chad fields, the export pipeline, background information, and the Banks role.

Crow, P.

1997-05-12T23:59:59.000Z

190

Problems of Security Proofs and Fundamental Limit on Key Generation Rate in Quantum Key Distribution  

E-Print Network (OSTI)

It is pointed out that treatments of the error correcting code in current quantum key distribution protocols of the BB84 type are not correct under joint attack, and the general interpretation of the trace distance security criterion is also incorrect. With correct interpretation of the criterion as well as a correct treatment of the error correcting code and privacy amplification code, it is shown that even for an ideal system under just collective attack, the maximum tolerable quantum bit error rate is about 1.5% and a net key cannot actually be generated with practical error correcting codes even at such low rates, contrary to claims in the literature.

Horace P. Yuen

2012-05-16T23:59:59.000Z

191

Finite-key analysis of high-dimensional time-energy entanglement-based quantum key distribution  

E-Print Network (OSTI)

We present a security analysis against collective attacks for the recently proposed time-energy entanglement-based quantum key distribution protocol, given the practical constraints of single photon detector efficiency, channel loss, and finite-key considerations. We find a positive secure-key capacity when the key length increases beyond $10^4$ for eight-dimensional systems. The minimum key length required is reduced by the ability to post-select on coincident single-photon detection events. Including finite-key effects, we show the ability to establish a shared secret key over a 200 km fiber link.

Catherine Lee; Jacob Mower; Zheshen Zhang; Jeffrey H. Shapiro; Dirk Englund

2013-11-05T23:59:59.000Z

192

Towards semantic performance measurement systems for supply chain management  

Science Conference Proceedings (OSTI)

The literature on Supply Chain Management (SCM) supports the integration of key business processes, including the performance management process, in order to increase the performance within and between the organisations. Nevertheless, the lack of proper ... Keywords: SCOR, business process management, ontology engineering, performance measurement systems, supply chain management

Artturi Nurmi; Thierry Moyaux; Valrie Botta-Genoulaz

2010-10-01T23:59:59.000Z

193

Tuesday Webcast for Industry: Key Energy-Saving Activities for Smaller Facilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ADVANCED MANUFACTURING OFFICE Tuesday Webcast for Industry Key Energy-Saving Activities for Smaller Facilities Webcast Questions and Answers: January 10, 2012 Presenters: Tom Wenning, Technical Account Manager, Oak Ridge National Laboratory Richard D. Feustel, Corporate Energy Services Manager, Briggs & Stratton Corporation The U.S. Department of Energy's (DOE's) Office of Advanced Manufacturing Program (AMO) hosts a series of webcasts on the first Tuesday of every month from 2:00 p.m. to 3:00 p.m. Eastern Standard Time. The series' objective is to help industrial personnel learn about software

194

Water Management Planning  

NLE Websites -- All DOE Office Websites (Extended Search)

water efficiency water efficiency at Federal sites Background The Federal Energy Management Program (FEMP) sponsored a water assessment at the Y-12 National Security Complex (Y-12) located in Oak Ridge, Tennessee, during fiscal year 2010. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment was to develop a comprehensive understanding of the current water-consuming applications and equipment at Y-12 and to identify key areas for water efficiency improvements. The water-assessment team learned key lessons from the Y-12 assessment. Therefore, the aim of this document is to share these key lessons to help other large process-driven sites at the Department of Energy (DOE) and beyond develop a comprehensive

195

Water Management Planning  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

water efficiency water efficiency at Federal sites Background The Federal Energy Management Program (FEMP) sponsored a water assessment at the Y-12 National Security Complex (Y-12) located in Oak Ridge, Tennessee, during fiscal year 2010. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment was to develop a comprehensive understanding of the current water-consuming applications and equipment at Y-12 and to identify key areas for water efficiency improvements. The water-assessment team learned key lessons from the Y-12 assessment. Therefore, the aim of this document is to share these key lessons to help other large process-driven sites at the Department of Energy (DOE) and beyond develop a comprehensive

196

Outage Management Benchmarking Guideline  

Science Conference Proceedings (OSTI)

Benchmarking of power plant outages will help plants target performance improvements to specific elements of a plant outage program in order to improve overall availability, reliability, and safety while decreasing generation costs. EPRI's "Outage Management Benchmarking Guideline" builds on the Institute's fossil and nuclear plant experience with routine maintenance and extends that to outage maintenance processes. The guideline describes the initial steps in an outage benchmarking effort and 13 key ele...

2003-03-26T23:59:59.000Z

197

Project Management Principles | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

304ProjectManagementPrinciples.pdf More Documents & Publications Microsoft PowerPoint - DOE O 413 3B Brief v9 with key points in notes Read-Only Accelerating Clean-up at...

198

Proceedings: Demand-Side Management Incentive Regulation  

Science Conference Proceedings (OSTI)

These proceedings provide background information on proposed regulatory incentive mechanisms to encourage utilities to develop demand-side management programs. Attendees discussed and analyzed various proposals and techniques and developed lists of key attributes that incentive mechanisms should have.

None

1990-05-01T23:59:59.000Z

199

Model and control for cooperative energy management  

E-Print Network (OSTI)

Proto/Amorphous Cooperative Energy Management (PACEM) aims to build and deploy a highly scalable system for smart power grids that will enable efficient demand shaping for small-user networks. Two key problems are to provide ...

Ranade, Vinayak V

2010-01-01T23:59:59.000Z

200

Compression station key to Texas pipeline project  

SciTech Connect

This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

NONE

1996-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Critical Infrastructure and Key Resources Sector-Specific Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) In June 2006, the U.S. Department of Homeland Security (DHS) announced completion of the National Infrastructure Protection Plan (NIPP) Base Plan, a comprehensive risk management framework that defines critical infrastructure protection (CIP) roles and responsibilities for all levels of government, private industry, and other security partners. The U.S. Department of Energy (DOE) has been designated the Sector-Specific Agency (SSA) for the Energy Sector,and is tasked with coordinating preparation of

202

FAQS Qualification Card - Transportation and Traffic Management |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation and Traffic Management Transportation and Traffic Management FAQS Qualification Card - Transportation and Traffic Management A key element for the Department's Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA). For each functional area, the FAQS identify the minimum technical competencies and supporting knowledge and skills for a typical qualified individual working in the area. FAQC-TransportationAndTrafficManagement.docx Description Transportation and Traffic Management Qualification Card

203

Efficient password-based authenticated key exchange without public information  

Science Conference Proceedings (OSTI)

Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of proposed PAKEs based on Diffie-Hellman key exchange ...

Jun Shao; Zhenfu Cao; Licheng Wang; Rongxing Lu

2007-09-01T23:59:59.000Z

204

Implementation of Distributed Key Generation Algorithms using Secure Sockets  

Science Conference Proceedings (OSTI)

Distributed Key Generation (DKG) protocols are indispensable in the design of any cryptosystem used in communication networks. DKG is needed to generate public/private keys for signatures or more generally for encrypting/decrypting messages. One such ...

A. T. Chronopoulos; F. Balbi; D. Veljkovic; N. Kolani

2004-08-01T23:59:59.000Z

205

Exploring the context : a small hotel in Key West  

E-Print Network (OSTI)

This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

VanBeuzekom, Edrick

1984-01-01T23:59:59.000Z

206

Performance Management  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Performance Management. ... If you are unable to access these PDF files, please contact the Office of Workforce Management.

2013-04-20T23:59:59.000Z

207

Building commissioning: The key to quality assurance  

SciTech Connect

This Guide is written to aid building owners and retrofit project managers currently participating in the Rebuild America program. The Guide provides information on implementing building commissioning projects that will optimize the results of existing building equipment improvements and retrofits projects. It should be used in coordination with Rebuild America`s Community Partnership Handbook. The Handbook describes, in detail, eight important steps necessary for planning and carrying out a community-wide energy-efficiency program. In step number 7 of the Handbook, commissioning is shown to be an integral aspect of implementing a building retrofit. The commissioning process ensures that a facility is safe, efficient, comfortable, and conducive to the presumed activities for which it was constructed. Rebuild America strongly encourages its partners to incorporate commissioning into their retrofit projects. By verifying the correct installation, functioning, operation, and maintenance of equipment, the commissioning process ensures that efficiency measures will continue to deliver benefits over the long term. Although commissioning can take place after the equipment has been installed, it is more effective when it takes place over the entire equipment installation process.

1998-05-01T23:59:59.000Z

208

Key Ingredient: Change in Material Boosts Prospects of ...  

Science Conference Proceedings (OSTI)

Key Ingredient: Change in Material Boosts Prospects of Ultrafast Single-photon Detector. From NIST Tech Beat: June 30, 2011. ...

2011-10-14T23:59:59.000Z

209

Nano Changes Rise to Macro Importance in a Key Electronics ...  

Science Conference Proceedings (OSTI)

Nano Changes Rise to Macro Importance in a Key Electronics Material. From NIST Tech Beat: April 7, 2009. ...

2012-10-01T23:59:59.000Z

210

ITL Bulletin - ITL Updates Glossary of Key Information Security ...  

Science Conference Proceedings (OSTI)

... ITL UPDATES GLOSSARY OF KEY INFORMATION SECURITY TERMS ... ITL plans to keep the glossary current by providing updates online. ...

2013-06-12T23:59:59.000Z

211

Better 'Photon Loops' May Be Key to Computer and Physics ...  

Science Conference Proceedings (OSTI)

Better 'Photon Loops' May Be Key to Computer and Physics Advances. From NIST Tech Beat: August 22, 2011. ...

2012-08-23T23:59:59.000Z

212

Energy Usage Data Standard for US Smart Grid Passes Key ...  

Science Conference Proceedings (OSTI)

Energy Usage Data Standard for US Smart Grid Passes Key Advisory Panel Vote. From NIST Tech Beat: March 1, 2011. ...

2011-03-01T23:59:59.000Z

213

Quantum key distribution system clocked at 2 GHz  

E-Print Network (OSTI)

Quantum key distribution system clocked at 2 GHz Karen J. Gordon, Veronica Fernandez, Gerald S, Ireland http://www.phy.hw.ac.uk/resrev/photoncounting/index.html Abstract: An improved quantum key-based quantum key distribution test system performance in terms of transmission distance and quantum bit error

Buller, Gerald S.

214

Managed Pressure Drilling Candidate Selection  

E-Print Network (OSTI)

Managed Pressure Drilling now at the pinnacle of the 'Oil Well Drilling' evolution tree, has itself been coined in 2003. It is an umbrella term for a few new drilling techniques and some preexisting drilling techniques, all of them aiming to solve several drilling problems, including non-productive time and/or drilling flat time issues. These techniques, now sub-classifications of Managed Pressure Drilling, are referred to as 'Variations' and 'Methods' of Managed Pressure Drilling. Although using Managed Pressure Drilling for drilling wells has several benefits, not all wells that seem a potential candidate for Managed Pressure Drilling, need Managed Pressure Drilling. The drilling industry has numerous simulators and software models to perform drilling hydraulics calculations and simulations. Most of them are designed for conventional well hydraulics, while some can perform Underbalanced Drilling calculations, and a select few can perform Managed Pressure Drilling calculations. Most of the few available Managed Pressure Drilling models are modified Underbalanced Drilling versions that fit Managed Pressure Drilling needs. However, none of them focus on Managed Pressure Drilling and its candidate selection alone. An 'Managed Pressure Drilling Candidate Selection Model and software' that can act as a preliminary screen to determine the utility of Managed Pressure Drilling for potential candidate wells are developed as a part of this research dissertation. The model and a flow diagram identify the key steps in candidate selection. The software performs the basic hydraulic calculations and provides useful results in the form of tables, plots and graphs that would help in making better engineering decisions. An additional Managed Pressure Drilling worldwide wells database with basic information on a few Managed Pressure Drilling projects has also been compiled that can act as a basic guide on the Managed Pressure Drilling variation and project frequencies and aid in Managed Pressure Drilling candidate selection.

Nauduri, Anantha S.

2009-05-01T23:59:59.000Z

215

Key findings of the national weatherization evaluation  

SciTech Connect

In 1990, the U.S. Department of Energy sponsored a comprehensive evaluation of its Weatherization Assistance Program, the nation`s largest residential energy conservation program. The primary goal of the evaluation was to establish whether the Program meets the objectives of its enabling legislation and fulfills its mission statement, to reduce the heating and cooling costs for low-income families-particularly the elderly, persons with disabilities, and children by improving the energy-efficiency of their homes and ensuring their health and safety. Oak Ridge National Laboratory managed a five-part study which produced a series of documents evaluating the Program. The objective of this document is to summarize the findings of the five-part National Weatherization Evaluation. The five studies were as follows: (1) Network Study-this study characterized the weatherization network`s leveraging, capabilities, procedures, staff, technologies, and innovations; (2) Resources and Population Study-this study profiled low-income weatherization resources, the weatherized population, and the population remaining to be served; (3) Multifamily Study-this study described the nature and extent of weatherization activities in larger multifamily buildings; (4) Single-family Study-this study estimated the national savings and cost- effectiveness of weatherizing single-family and small multifamily dwellings that use natural gas or electricity for space heating; (5) Fuel-Oil Study-this study estimated the savings and cost-effectiveness of weatherizing single-family homes, located in nine northeastern states, that use fuel oil for space heating. This paper provides a brief overview of each study`s purposes, research methods and most important findings.

Brown, M.A.; Berry, L.G.

1994-10-01T23:59:59.000Z

216

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts November 29, 2011 - 4:34pm Addthis THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASENovember 29, 2011 President Obama Announces More Key Administration Posts WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Frederick "Rick" Barton - Assistant Secretary for Conflict and Stabilization Operations and Coordinator for Reconstruction and Stabilization, Department of State Arun Majumdar - Under Secretary of Energy, Department of Energy Marie F. Smith - Member, Social Security Advisory Board The President also announced his intent to appoint the following

217

Managing time  

Science Conference Proceedings (OSTI)

Professionals overwhelmed with information glut can find hope from new insights about time management.

Peter J. Denning

2011-03-01T23:59:59.000Z

218

Secret key distillation from shielded two-qubit states  

Science Conference Proceedings (OSTI)

The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

2010-05-15T23:59:59.000Z

219

Secret key distillation from shielded two-qubit states  

E-Print Network (OSTI)

The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

Joonwoo Bae

2008-03-03T23:59:59.000Z

220

Achieving Autonomous Power Management Using Reinforcement Learning  

E-Print Network (OSTI)

YING TAN and JUN LU, Binghamton University QING WU, Air Force Research Laboratory QINRU QIU, Syracuse Additional Key Words and Phrases: Power management, thermal management, machine learning, computer ACM using rein- forcement learning. ACM Trans. Des. Autom. Electron. Syst. 18, 2, Article 24 (March 2013

Qiu, Qinru

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Competency Management Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Competency Management Program Competency Management Program Competency Management Program The DOE faces a talent challenge derived from a number of factors including a dynamic operating environment, an anticipated wave of retirements from the workforce, and a projected shortage of workers with needed skills. The Office of the Chief Human Capital Officer (CHCO) is charged with leading the effort to address the talent challenge. The strategic identification, development and use of competencies are key enablers "for strategically aligning the agency's workforce to its missions through effective management of human capital policies and programs." Competency-centric Learning and Development facilitates the selection, development, training, and management of a highly skilled, productive, and diverse workforce.

222

Problem and Preferred Management Practices Identification Workshop  

SciTech Connect

The goals for this workshop were: to introduce key players in the Appalachian basin oil industry to DOE's new Preferred Upstream Management Practices (PUMP) program; to explain the various elements of our two-year project in detail; to transfer technology through a series of short, invited talks; to identify technical problems and best management practices; and to recruit members for our Preferred Management Practices (PMP) Council.

Patchen, Douglas G.

2003-03-10T23:59:59.000Z

223

EIA Data: 2011 United States Residential Sector Key Indicators and  

Open Energy Info (EERE)

Residential Sector Key Indicators and Residential Sector Key Indicators and Consumption Dataset Summary Description This dataset is the 2011 United States Residential Sector Key Indicators and Consumption, part of the Annual Energy Outlook that highlights changes in the AEO Reference case projections for key energy topics. Source EIA Date Released December 16th, 2010 (4 years ago) Date Updated Unknown Keywords consumption EIA energy residential sector key indicators Data application/vnd.ms-excel icon Residential Sector Key Indicators and Consumption (xls, 62.5 KiB) Quality Metrics Level of Review Peer Reviewed Comment Temporal and Spatial Coverage Frequency Annually Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL) Comment http://www.eia.gov/abouteia/copyrights_reuse.cfm

224

Earned Value Management System RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Earned Value Management System Review Module Earned Value Management System Review Module March 2010 CD-0 O Ea 0 OFFICE OF arned Va C CD-1 F ENVIRO Standard R alue Man Rev Critical Decis CD-2 M ONMENTAL Review Plan agement view Module sion (CD) Ap CD March 2010 L MANAGE n (SRP) t System e pplicability D-3 EMENT (EVMS) CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-1189-2008,

225

Security proof of practical quantum key distribution schemes  

E-Print Network (OSTI)

This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

Yodai Watanabe

2005-06-29T23:59:59.000Z

226

Florida Keys Electric Cooperative - Residential Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Florida Keys Electric Cooperative - Residential Rebate Program Florida Keys Electric Cooperative - Residential Rebate Program Florida Keys Electric Cooperative - Residential Rebate Program < Back Eligibility Residential Savings Category Home Weatherization Commercial Weatherization Sealing Your Home Heating & Cooling Commercial Heating & Cooling Cooling Insulation Design & Remodeling Windows, Doors, & Skylights Program Info State Florida Program Type Utility Rebate Program Rebate Amount Rebates $25 - $500, max $1000 per member Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a free home energy audit. An FKEC trained auditor will assess the home and make recommendations for

227

Natural Gas Markets: Recent Changes and Key Drivers  

U.S. Energy Information Administration (EIA)

U.S. Energy Information Administration Independent Statistics & Analysis www.eia.gov Natural Gas Markets: Recent Changes and Key Drivers for

228

NREL: News - NREL Fills Key Leadership Role for Energy Systems...  

NLE Websites -- All DOE Office Websites (Extended Search)

513 NREL Fills Key Leadership Role for Energy Systems Integration June 17, 2013 Bryan J. Hannegan will join the Energy Department's National Renewable Energy Laboratory on June 24...

229

Advanced Analysis Software Key to New, Energy-Efficient ...  

Advanced Analysis Software Key to New, Energy-Efficient Technologies Leveraging Scientific and Engineering Know-How to Advance Sources of Renewable En ...

230

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts May 28, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Gordon Heddell, Inspector General, Department of Defense; Ellen Murray, Assistant Secretary for Resources and Technology, Department of Health and Human Services; Polly Trottenberg, Assistant Secretary for Transportation Policy, Department of Transportation; and James J. Markowsky, Assistant Secretary for Fossil Energy, Department of Energy. President Obama said, "Each of these individuals brings extensive expertise in their chosen fields, and they are joining my administration at a time

231

Thailand-Key Results and Policy Recommendations for Future Bioenergy...  

Open Energy Info (EERE)

013 Country Thailand UN Region South-Eastern Asia References Thailand-Key Results and Policy Recommendations for Future Bioenergy Development1 Abstract "The Government of...

232

Overview of Indian Hydrogen Program and Key Safety Issues of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Energy Road Map - Initiatives - Target 2020 : GIFT - Programme in India - CNG - H 2 Programme - Partnership - Technology Development - Concerns & Challenges * Key...

233

Report Identifies Three Key R&D Priorities for Future ...  

Science Conference Proceedings (OSTI)

... Networking and Information Technology Research and Development Program. For more details, see Report Identifies Three Key R&D Priorities for ...

2011-07-18T23:59:59.000Z

234

EIA highlights key factors in new energy and financial markets ...  

U.S. Energy Information Administration (EIA)

Yesterday, EIA launched a new web-based assessment highlighting key factors that can affect crude oil prices called "Energy and Financial Markets: What Drives Crude ...

235

TEC Working Group Topic Groups Rail Key Documents Intermodal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Intermodal Subgroup TEC Working Group Topic Groups Rail Key Documents Intermodal Subgroup Intermodal Subgroup Draft Work Plan More Documents & Publications TEC Working Group Topic...

236

Big Coppitt Key, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Bureau 2005 Place to 2006 CBSA Retrieved from "http:en.openei.orgwindex.php?titleBigCoppittKey,Florida&oldid227749" Categories: Places Stubs Cities What links here...

237

Big Pine Key, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Bureau 2005 Place to 2006 CBSA Retrieved from "http:en.openei.orgwindex.php?titleBigPineKey,Florida&oldid227765" Categories: Places Stubs Cities What links here...

238

Building Technologies Office: Key Activities in Energy Efficiency  

NLE Websites -- All DOE Office Websites (Extended Search)

work in three key areas in order to continually develop innovative, cost-effective energy saving solutions. research and development (R&D), market stimulation, and building...

239

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with...

240

TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Radiation Monitoring Subgroup TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring Subgroup Radiation Monitoring Subgroup Draft Work Plan - February 4, 2008 More...

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Knowledge, Skills, and Abilities for Key Radiation Protection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Notice No. 1 November 2007 DOE STANDARD KNOWLEDGE, SKILLS, AND ABILITIES FOR KEY RADIATION PROTECTION POSITIONS AT DOE FACILITIES U.S. Department of Energy FSC 6910...

242

Key Facts about the Mathematics and Computer Science Division...  

NLE Websites -- All DOE Office Websites (Extended Search)

Publications Documents Key Facts about the Mathematics and Computer Science Division Researchers in the Mathematics and Computer Science Division attack complex problems in four...

243

Advanced Analysis Software Key to New, Energy-Efficient ...  

Advanced Analysis Software Key to New, Energy-Efficient Technologies Leveraging Scientific and Engineering Know-How to Advance Sources of Renewable Energy

244

Fossil Energy Announces Addition of Three Key Staff Members ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

appointment of three key senior staff members to the Office of Fossil Energy - James F. Wood, Deputy Assistant Secretary for Clean Coal; Christopher A. Smith, Deputy Assistant...

245

DVD Production Process & Key Factors for Quality Discs  

Science Conference Proceedings (OSTI)

... wide market share for DVD +/- RW; #2 World-wide market share for CD ... Key factor - deep knowledge of forming thin metal film - optimization of ...

2006-01-20T23:59:59.000Z

246

Management Responsibilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Responsibilities Management Responsibilities Depleted UF6 Management Responsibilities DOE has responsibility for safe and efficient management of approximately 700,000 metric tons of depleted UF6. Organizational Responsibilities In the United States, the U.S. Department of Energy is responsible for managing all the depleted uranium that has been generated by the government and has been declared surplus to national defense needs. In addition, as a result of two memoranda of agreement that have been signed between the DOE and USEC, the DOE has assumed management responsibility for approximately 145,000 metric tons of depleted UF6 that has been or will be generated by USEC. Any additional depleted UF6 that USEC generates will be USEC's responsibility to manage. DOE Management Responsibility

247

RCDA: Architecting as a risk- and cost management discipline  

Science Conference Proceedings (OSTI)

We propose to view architecting as a risk- and cost management discipline. This point of view helps architects identify the key concerns to address in their decision making, by providing a simple, relatively objective way to assess architectural significance. ... Keywords: Cost management, Risk Management, Software architecture

Eltjo R. Poort; Hans Van Vliet

2012-09-01T23:59:59.000Z

248

A design of an integrated document system for project management  

Science Conference Proceedings (OSTI)

The paper describes a design model for an integrated document system for project management, which takes into account the key requirement of ensuring consistent and high-quality project management documentation. The model is based on structured documents ... Keywords: document system, model, project management

Iulian Intorsureanu; Rodica Mihalca; Adina Uta; Anca Andreescu

2009-06-01T23:59:59.000Z

249

Federal Energy Management Program: Energy Management Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Energy Management Guidance to someone by E-mail Share Federal Energy Management Program: Energy Management Guidance on Facebook Tweet about Federal Energy Management Program: Energy Management Guidance on Twitter Bookmark Federal Energy Management Program: Energy Management Guidance on Google Bookmark Federal Energy Management Program: Energy Management Guidance on Delicious Rank Federal Energy Management Program: Energy Management Guidance on Digg Find More places to share Federal Energy Management Program: Energy Management Guidance on AddThis.com... Requirements by Subject Requirements by Regulation Notices & Rules Guidance Facility Reporting Fleet Reporting Energy Management Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal

250

EERE Program Management Guide | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EERE Program Management Guide EERE Program Management Guide EERE Program Management Guide Updated in December 2007, this guide is a comprehensive reference manual on EERE program management. The following documents are available as Adobe Acrobat PDFs. Cover and Table of Contents Introduction Chapter 1 - Background 1.1 About the U.S. Department of Energy 1.2 About the Office of Energy Efficiency and Renewable Energy Chapter 2 - EERE Business Model and Management System 2.1 EERE Programs as Key Mission Elements 2.2 Distinctions Among EERE Programs, Projects, and Agreements 2.3 EERE Programs and Subprograms 2.4 Roles and Responsibilities of Headquarters and Field Activities 2.5 Program Management Vis-à-vis Project Management Responsibilities 2.6 How to Manage an EERE Program: A Macro Look at the Program

251

Metrics: How to Improve Key Business Results, 1st edition  

Science Conference Proceedings (OSTI)

Metrics are a hot topic. Executive leadership, boards of directors, management, and customers are all asking for data-based decisions. As a result, many managers, professionals, and change agents are asked to develop metrics, but have no clear idea ...

Martin Klubeck

2011-12-01T23:59:59.000Z

252

President Obama Announces More Key Administration Posts | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assistant Secretary for Congressional and Intergovernmental Affairs, Department of Energy Larry Robinson, Assistant Secretary of Commerce (Conservation and Management), NOAA,...

253

Update on Key Model Based Engineering (MBE)-related ...  

Science Conference Proceedings (OSTI)

... managing traffic congestion) Science Explores the Earth, solar system and ... and space exploration for society Earth: Weather, Carbon Cycle & ...

2013-02-28T23:59:59.000Z

254

Robust data sharing with key-value stores  

Science Conference Proceedings (OSTI)

A key-value store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become widely used as shared storage solutions for Internet-scale distributed applications. We present a fault-tolerant wait-free efficient ... Keywords: cloud storage, distributed storage

Cristina Basescu; Christian Cachin; Ittay Eyal; Robert Haas; Marko Vukolic

2011-06-01T23:59:59.000Z

255

Robust data sharing with key-value stores  

Science Conference Proceedings (OSTI)

A key-value store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become the most popular way to access Internet-scale cloud storage systems. We present an efficient wait-free algorithm that ...

Cristina Basescu; Christian Cachin; Ittay Eyal; Robert Haas; Alessandro Sorniotti; Marko Vukolic; Ido Zachevsky

2012-06-01T23:59:59.000Z

256

A framework for password-based authenticated key exchange1  

Science Conference Proceedings (OSTI)

In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the recently ... Keywords: Passwords, authentication, dictionary attack, projective hash functions

Rosario Gennaro; Yehuda Lindell

2006-05-01T23:59:59.000Z

257

Cryptanalysis of two three-party encrypted key exchange protocols  

Science Conference Proceedings (OSTI)

Due to the simplicity of maintaining human memorable passwords without any assistant storage device, password-based three-party encrypted key exchange (3PEKE) protocol has become one of the most promising research fields on user authentication and secure ... Keywords: Authentication, Cryptanalysis, Security, Three-party encrypted key exchange (3PEKE) protocol, Undetectable on-line password guessing attacks

N. W. Lo; Kuo-Hui Yeh

2009-11-01T23:59:59.000Z

258

Energy Security: A Key Requirement forSustainable Development  

E-Print Network (OSTI)

1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

259

MeerKAT Key Project Science, Specifications, and Proposals  

E-Print Network (OSTI)

We present the specifications of the MeerKAT Karoo Array Telescope, the South African Square Kilometre Array Precursor. Some of the key science for MeerKAT is described in this document. We invite the community to submit proposals for Large Key Projects.

Booth, R S; Jonas, J L; Fanaroff, B

2009-01-01T23:59:59.000Z

260

A matricial public key cryptosystem with digital signature  

Science Conference Proceedings (OSTI)

We describe a new public key cryptosystem using block upper triangular matrices with elements in Zp, based on a generalization of the discrete logarithm problem over a finite group. The proposed cryptosystem is very efficient, requiring ... Keywords: DLP, Diffie-Hellman, ElGamal, cryptography, digital signature, finite fields, polynomial matrices, public-key, security

Rafael Alvarez; Francisco-Miguel Martinez; Jose-Francisco Vicent; Antonio Zamora

2008-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Efficient decoy-state quantum key distribution with quantified security  

E-Print Network (OSTI)

We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol implemented with decoy states and apply the results to a gigahertz-clocked quantum key distribution system. Despite the enhanced security level, the obtained secure key rates are the highest reported so far at all fibre distances.

M. Lucamarini; K. A. Patel; J. F. Dynes; B. Frhlich; A. W. Sharpe; A. R. Dixon; Z. L. Yuan; R. V. Penty; A. J. Shields

2013-10-01T23:59:59.000Z

262

Electricity and Development: Global Trends and Key Challenges  

E-Print Network (OSTI)

Electricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12 and the transport burden in Tanzania. Source: Modi, 2004 #12;2. Energy and Human Development Access to electricity

263

Extending the Horizons: Environmental Excellence as Key to Improving Operations  

Science Conference Proceedings (OSTI)

The view that adopting an environmental perspective on operations can lead to improved operations is in itself not novel; phrases such as lean is green are increasingly commonplace. The implication is that any operational system that has minimized inefficiencies ... Keywords: environmental management, quality management, supply chain management, sustainability

Charles J. Corbett; Robert D. Klassen

2006-01-01T23:59:59.000Z

264

Managing Tribal Lands and Resources in Michigan: Tribal, State, and Federal Influence.  

E-Print Network (OSTI)

?? Michigan Indigenous Tribes, along with the State and Federal government, are key players in current environmental management programs and policy. The current relationship between (more)

Crafts, Elise M.

2013-01-01T23:59:59.000Z

265

MANAGEMENT OF BLOWDOWN FROM CLOSED LOOP COOLING SYSTEMS USING IMPAIRED WATERS.  

E-Print Network (OSTI)

??Management of cooling tower blowdown is one of the key components in cooling tower operation and usually requires treatment to meet local, state or federal (more)

Feng, Yinghua

2010-01-01T23:59:59.000Z

266

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts President Obama Announces More Key Administration Posts July 8, 2011 - 12:00am Addthis THE WHITE HOUSE Office of the Press Secretary WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Michael A. Hammer, Assistant Secretary for Public Affairs, Department of State Charles McConnell, Assistant Secretary for Fossil Energy, Department of Energy The President also announced his intent to appoint the following individuals to key Administration posts: Terry Guen, Member, Advisory Council on Historic Preservation Dorothy T. Lippert, Member, Advisory Council on Historic Preservation Rosemary A. Joyce, Member, Cultural Property Advisory Committee President Obama said, "Our nation will be greatly served by the talent and

267

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Albert Einstein Distinguished Educator Fellowship (AEF) Program Einstein Fellowship Home Eligibility Benefits Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page Key Dates for the 2014-2015 Einstein Fellowship Application process. On-line Application Opens September 24, 2013 Application Deadline 5:00pm EST December 4, 2013 Application Review 7-8 weeks Notification to Semi-Finalists [Travel Arrangements made for Interviews in Washington, DC] Late January 2014 Interviews in Washington, DC February 23-25, 2014 Finalists Notifications March 2014 Congressional Fellows Placement Interviews June - July 2014 Fellows Arrive in Washington, DC August 2014 Orientation meeting for the 2014-2015 Einstein Fellows

268

Security Notions for Quantum Public-Key Cryptography  

E-Print Network (OSTI)

It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

Takeshi Koshiba

2007-02-19T23:59:59.000Z

269

Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA  

E-Print Network (OSTI)

encryption and authentication capabilities to the devices that control the transmission of data across grid within the power grid to collect data and transmit it back to a central unit for processing. SCADA power SCADA systems that seeks to take advantage of the full security capacity of a given network

270

Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure (AMI)  

Science Conference Proceedings (OSTI)

Smart grid technologies are introducing millions of new intelligent components to the electric grid that communicate in much more advanced ways (two-way communications, dynamic optimization, and wired and wireless communications) than in the past. Cyber security is important because the bi-directional flow of two-way communication and control capabilities in the smart grid that will enable an array of new functionalities and applications.One area of critical importance to the security of ...

2012-11-29T23:59:59.000Z

271

Supply management by major exporters key to market in year`s second half  

Science Conference Proceedings (OSTI)

The paper gives a review of the international oil market; prices for crude, petroleum products, and natural gas; US demand for energy including natural gas, petroleum, gasoline, distillates, residual fuel oils, LPG, and other products; the US petroleum supply (refiner output, imports, and inventories).

Beck, R.J.

1998-07-27T23:59:59.000Z

272

FAQS Qualification Card - Construction Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Construction Management Construction Management FAQS Qualification Card - Construction Management A key element for the Department's Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA). For each functional area, the FAQS identify the minimum technical competencies and supporting knowledge and skills for a typical qualified individual working in the area. FAQC-ConstructionManagement.docx Description Construction Management Qualification Card More Documents & Publications FAQS Gap Analysis Qualification Card - Construction Management

273

Population modeling in conservation planning of the Lower Keys marsh rabbit  

E-Print Network (OSTI)

Rapid development and urbanization of the Lower Florida Keys in the last 30 years has fragmented the habitat of the Lower Keys marsh rabbit (Sylvilagus palustris hefneri) and threatened it with extinction. Current threats exist at multiple spatiotemporal scales and include threats due to development, invasive species, and global climate change. On Boca Chica Key, the Lower Keys marsh rabbit (LKMR) exists as a metapopulation on Naval Air Station-Key West (NASKW). I conducted a population viability analysis to determine the metapopulation's risk of extinction under multiple management scenarios by developing a spatially-explicit, stage-structured, stochastic matrix model using the programs RAMAS Metapop and ArcGIS. These management scenarios include clearance of airfield vegetation, habitat conversion, and control of feral cats as an invasive species. Model results provided the Navy with relative risk estimates under these different scenarios. Airfield clearance with habitat conversion increased extinction risk, but when coupled with feral cat control, risk was decreased. Because of the potential of sea-level rise due to human-induced global climate change, and its projected impact on the biodiversity of the Florida Keys, I estimated the impacts of rising sea levels on LKMR across its geographic distribution under scenarios of no, low (0.3m), medium (0.6m), and high (0.9m) sea-level rise. I also investigated impacts due to 2 treatments (allowing vegetation to migrate upslope and not allowing migration), and 2 land-use planning decisions (protection and abandonment of humandominated areas). Not surprisingly, under both treatments and both land-use planning decisions, I found a general trend of decreasing total potential LKMR habitat with increasing sea-level rise. Not allowing migration and protecting human-dominated areas both tended to decrease potential LKMR habitat as compared with allowing migration and abandoning human-dominated areas. In conclusion, conservation strategies at multiple scales need to be implemented in order to reduce threats to LKMR, such as development, invasive species, and global climate change.

LaFever, David Howard

2006-08-01T23:59:59.000Z

274

Combining neural methods and knowledge-based methods in accident management  

Science Conference Proceedings (OSTI)

Accident management became a popular research issue in the early 1990s. Computerized decision support was studied from many points of view. Early fault detection and information visualization are important key issues in accident management also today. ...

Miki Sirola, Jaakko Talonen

2012-01-01T23:59:59.000Z

275

Cost Maps for Fossil Assets Management: Based on a Case Study With Minnesota Power Company  

Science Conference Proceedings (OSTI)

The key to effective management of utility assets is determining the benefits and costs of options over various timeframes. This report describes and illustrates a structured approach to asset management decision making using cost maps.

1995-04-13T23:59:59.000Z

276

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

277

The Electricity Transmission System Opportunities to Overcome Key Challenges  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Opportunities to Overcome Key Challenges Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia November 2, 2012 Breakout Group Discussion Overview Opportunities to Overcome Key Challenges Each of the four breakout groups prioritized the critical issues facing the grid from the list of synthesized challenges identified in the first breakout session of the workshop. Focusing on these top priorities, each group proposed specific R&D activities and initiatives that DOE can pursue to overcome these challenges and address existing gaps. Summary of Synthesized Challenges A. Need improved understanding of the availability, utility, maintenance, exchange, and security of data and associated requirements.

278

A Key-Distribution Scheme for Wireless Home Automation Networks  

E-Print Network (OSTI)

Wireless home automation networks are one example of how wireless technologies may soon become part of our daily life, yet security in existing products is woefully inadequate. An important problem in this area is the question of secure key distribution. In this paper we present a key-distribution scheme geared towards home automation networks, but applicable to other networks with related properties as well. Our approach uses a decentralized scheme that is designed to work on resource-poor devices, allows easy addition and removal of devices and limits the workload on the end user while guaranteeing the secrecy of the exchanged keys even in the presence of subverted nodes.

Arno Wacker; Timo Heiber; Holger Cermann

2004-01-01T23:59:59.000Z

279

Federal Energy Management Program: Computerized Maintenance Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Computerized Computerized Maintenance Management Systems to someone by E-mail Share Federal Energy Management Program: Computerized Maintenance Management Systems on Facebook Tweet about Federal Energy Management Program: Computerized Maintenance Management Systems on Twitter Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Google Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Delicious Rank Federal Energy Management Program: Computerized Maintenance Management Systems on Digg Find More places to share Federal Energy Management Program: Computerized Maintenance Management Systems on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

280

Department of Energy Announces Senior Management Changes | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Announces Senior Management Changes Announces Senior Management Changes Department of Energy Announces Senior Management Changes November 20, 2012 - 12:00pm Addthis WASHINGTON, D.C. - The Office of Environmental Management (EM) and the National Nuclear Security Administration (NNSA) today jointly announced two key personnel changes that will bring significant leadership and project management experience to both organizations. Scott Samuelson, Manager of the Office of River Protection (ORP), will be leaving EM in January to return to NNSA, where he previously worked from the date it was formed in 2000. With Samuelson's departure, Kevin Smith, Manager of NNSA's Los Alamos Site Office (LASO), will become the ORP Manager. "Scott and Kevin are key senior executives in the Department of Energy," said Undersecretary for Nuclear Security and NNSA Administrator

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation and Quality Assurance for Data Sharing and Archival Now that you have planned your project and data management, collected data, integrated imagery, or generated model...

282

SUBCONTRACT MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-1 -1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish, document, and maintain adequate purchasing systems. 2. To ensure contractors flow down contract requirements to subcontractors. WHY IS SUBCONTRACT MANAGEMENT IMPORTANT? In many Department prime contracts a significant portion of the obligated dollars is spent on subcontract work. Due to the absence of a direct contractual relationship with the subcontractor, the Department must rely on the prime contractor to manage subcontract work. Subcontractors perform significant work efforts at sites and are an integral part of the site's success. Prime

283

Reservation Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Reservation Management The ORR is home to three major facility complexes: the East Tennessee Technology Park (ETTP), the National Nuclear Security Administration's (NNSA's) Y-12...

284

Management Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

to global waste vitrification and related programs Serve as a technical platform for DOE reviews Environmental Management Leadership Team Responsible for identifying or...

285

Management Plan  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Plan (SSMP) to be submitted to Congress after the April 2010 release of the Nuclear Posture Review Report. It is aligned with the President's National Security Strategy...

286

Chapter 7: Landscape Design and Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

: Landscape : Landscape Design and Management Landscape Issues at LANL Stormwater Management Using Water Outdoors Parking Pavement Landscape Vegetation Exterior Lighting LANL | Chapter 7 Landscape Design and Management Landscape Issues at LANL Once the site analysis has been completed, design scheme alternatives have been developed and evalu- ated, and the building footprint and placement have been determined, design and specifications can be refined for the landscape surrounding the building. Several key elements of the landscape design are addressed in this section: Stormwater management Using water outdoors Parking pavement Landscape vegetation Exterior lighting The first four of these elements are linked by their impacts on water. The Laboratory is located in an area

287

Department of Energy Announces Key Additions to Public Affairs Staff |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Announces Key Additions to Public Affairs Announces Key Additions to Public Affairs Staff Department of Energy Announces Key Additions to Public Affairs Staff February 26, 2009 - 12:00am Addthis WASHINGTON, DC - Today, the Department of Energy announced key staff additions to the Office Public Affairs: Dan Leistikow, Director of Public Affairs; Tom Reynolds, Deputy Director of Public Affairs; Stephanie Mueller, Press Secretary; and Tiffany Edwards, Deputy Press Secretary. "I am pleased to have these talented individuals join the Department of Energy", said Secretary Steven Chu. "Having worked on President Obama's presidential campaign Dan, Tom, Stephanie and Tiffany bring knowledge about the President's commitment to end our addiction to foreign oil, invest in alternative and renewable energy, address the global climate crisis and

288

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

289

Table A4. Residential sector key indicators and consumption  

Gasoline and Diesel Fuel Update (EIA)

3 3 U.S. Energy Information Administration | Annual Energy Outlook 2013 Reference case Table A4. Residential sector key indicators and consumption (quadrillion Btu per year, unless otherwise noted) Energy Information Administration / Annual Energy Outlook 2013 Table A4. Residential sector key indicators and consumption (quadrillion Btu per year, unless otherwise noted) Key indicators and consumption Reference case Annual growth 2011-2040 (percent) 2010 2011 2020 2025 2030 2035 2040 Key indicators Households (millions) Single-family ....................................................... 82.85 83.56 91.25 95.37 99.34 103.03 106.77 0.8% Multifamily ........................................................... 25.78 26.07 29.82 32.05 34.54 37.05 39.53 1.4%

290

DOE Announces More Key Administration Posts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts DOE Announces More Key Administration Posts March 27, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Ray Mabus, Secretary of the Navy, Department of Defense; Donald Remy, General Counsel of the Army, Department of Defense; J. Randolph Babbitt, Administrator, Federal Aviation Administration; Jose D. Riojas, Assistant Secretary for Operations, Security and Preparedness, Department of Veterans Affairs; John Trasviña, Assistant Secretary for Fair Housing and Equal Opportunity, Department of Housing and Urban Development; Lawrence E. Strickling, Assistant Secretary for Communications and Information, Department of Commerce; and Cathy Zoi, Assistant Secretary for Energy Efficiency and

291

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Key Actions) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

292

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts June 10, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Joan Evans, Assistant Secretary for Congressional and Legislative Affairs, Department of Veterans Affairs; Warren F. "Pete" Miller, Jr., PhD, Assistant Secretary for Nuclear Energy, Department of Energy; and John R. Norris, Commissioner, Federal Energy Regulatory Commission. President Obama said, "I am grateful that these three impressive individuals will be working with me in these important roles. The commitment of these experienced public servants has made an impression on

293

Key Science and Engineering Indicators: Digest 2012 | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Science and Engineering Indicators: Digest 2012 Key Science and Engineering Indicators: Digest 2012 BusinessUSA Data/Tools Apps Challenges Let's Talk BusinessUSA You are here Data.gov » Communities » BusinessUSA » Data Key Science and Engineering Indicators: Digest 2012 Dataset Summary Description This 2012 digest of key S&E indicators is an interactive tool that draws from the National Science Board's (NSB's) Science and Engineering Indicators report. The digest serves to draw attention to important trends and data points from across Indicators and to introduce readers to the data resources available in the report. Tags {science,engineering,indicators,statistics,nsf,nsb,srs,federal,government,education,labor,employment,workforce,research,development,industry,international,global,r&d,technology,patents,"research citations"}

294

DOE Announces More Key Administration Posts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts DOE Announces More Key Administration Posts March 20, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Dr. Steven E. Koonin, Under Secretary for Science, Department of Energy; David Sandalow, Assistant Secretary for Policy and International Affairs, Department of Energy; Ambassador Johnnie Carson, Assistant Secretary for African Affairs, State Department; Kathy Martinez, Assistant Secretary for Disability Employment Policy (ODEP), Department of Labor; Jonathan S. Adelstein, Administrator for the Rural Utilities Service, United States Department of Agriculture; Timothy W. Manning, Deputy Administrator for National Preparedness, FEMA, Department of Homeland Security; and Priscilla

295

Key Activities in Energy Efficiency | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

About » Key Activities in Energy Efficiency About » Key Activities in Energy Efficiency Key Activities in Energy Efficiency The Building Technologies Office conducts work in three key areas in order to continually develop innovative, cost-effective energy saving solutions: research and development (R&D), market stimulation, and building codes and equipment standards. Working with our partners on these activities results in better products, better new homes, better ways to improve older homes, and better buildings in which to work, shop, and lead our everyday lives. Research and Development Spearhead the development of new, energy efficient technologies. Lead R&D activities that reduce home energy use through Building America. Collaborate with industry to improve the energy efficiency of new

296

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Science Undergraduate Laboratory Internships (SULI) SULI Home Eligibility Benefits Participant Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page At the submission deadline (shown in red) the application system will close, and no materials will be accepted after the submission deadline has passed. The Application System closes at 5:00 PM Eastern Time. SULI Internship Term: Spring 2014 Summer 2014* Fall 2013 On-line Application Opens August 6, 2013 October 18, 2013 May 1, 2013 Applications Due October, 1, 2013 5:00 PM ET January 10, 2014 5:00 PM ET June 12, 2013 5:00 PM ET Offer Notification Period Begins on or around October, 15, 2013 January 20, 2014 June 24, 2013

297

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Visiting Faculty Program (VFP) VFP Home Eligibility Benefits Participant Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page At the submission deadline (shown in red) the application system will close, and no materials will be accepted after the submission deadline has passed. The Application System closes at 5:00 PM Eastern Time. VFP Term: Summer 2014 On-line Application Opens October 18, 2013 Applications Due January 10, 2014 5:00 PM ET* Offer Notification Period Begins January 20, 2014 All DOE Offers and Notifications Complete April 1, 2014 *A research proposal co-developed with a DOE laboratory researcher must be electronically submitted by all faculty applicants as part of their

298

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

299

Energy Secretary Bodman Commends Key Milestone In MOX Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Commends Key Milestone In MOX Program Commends Key Milestone In MOX Program Energy Secretary Bodman Commends Key Milestone In MOX Program April 1, 2005 - 11:28am Addthis WASHINGTON, DC - In response to the Nuclear Regulatory Commission's (NRC) authorization of the construction of a U.S. Mixed-Oxide (MOX) Fuel Fabrication Facility at the Department of Energy's Savannah River Site in South Carolina, Secretary of Energy Samuel W. Bodman today released the following statement: "Issuing the permit for construction of a MOX facility in South Carolina is the crucial next step in the MOX program. It is a key milestone in our efforts to dispose of surplus weapons grade plutonium in the U.S. and Russia," Secretary Bodman said. "We look forward to proceeding with this nonproliferation program that will ultimately eliminate enough

300

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts December 9, 2009 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Patricia A. Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, Department of Energy Mari Del Carmen Aponte, Ambassador to the Republic of El Salvador, Department of State Donald E. Booth, Ambassador to the Federal Democratic Republic of Ethiopia, Department of State Larry Persily, Federal Coordinator for Alaska Natural Gas Transportation Projects President Obama said, "The depth of experience these individuals bring to their roles will be valuable to my administration as we work to bring about

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Worldwide Trends in Energy Use and Efficiency: Key Insights from...  

Open Energy Info (EERE)

Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

302

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to  

NLE Websites -- All DOE Office Websites (Extended Search)

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to policy makers on energy codes and to offer guidance on how policy makers can support the creation of statewide energy...

303

A linux kernel cryptographic framework: decoupling cryptographic keys from applications  

Science Conference Proceedings (OSTI)

This paper describes a cryptographic service framework for the Linux kernel. The framework enables user-space applications to perform operations with cryptographic keys, while at the same time ensuring that applications cannot directly access or extract ...

Nikos Mavrogiannopoulos; Miloslav Trma?; Bart Preneel

2012-03-01T23:59:59.000Z

304

SLAC National Accelerator Laboratory - LCLS-II Passes Key Milestone...  

NLE Websites -- All DOE Office Websites (Extended Search)

LCLS-II Passes Key Milestone in DOE Approval Process By Glennda Chui November 1, 2011 The Department of Energy has approved a preliminary budget, schedule and design plans for the...

305

Recommendation for Pair-Wise Key Establishment Schemes ...  

Science Conference Proceedings (OSTI)

... with unilateral key-confirmation from party V to party ... may be a component of a protocol, which in ... Note that protocols, per se, are not specified in this ...

2013-06-05T23:59:59.000Z

306

Nano Lect 1 Questions and Keypoints Key Points  

E-Print Network (OSTI)

Nano Lect 1 ­ Questions and Keypoints Key Points 1. What is nano technology: a. Very small technology with device in the 1nm to 100nm lots of useful properties Questions 1. Define nanotechnology. Is an nano

Smy, Tom

307

First look at cellulose's early production could hold keys to...  

NLE Websites -- All DOE Office Websites (Extended Search)

cellulose's early production could hold keys to bacteria-free medical devices, better biofuel By Jared Sagoff * May 14, 2013 Tweet EmailPrint Produced by plants as well as algae...

308

The use of a logistic map for key generation  

E-Print Network (OSTI)

A key generation scheme is proposed and its performance analyzed. The method, the logistic map scheme (LMS), is applicable for use on wireless networks because it does not require devices to engage in computationally ...

Ando, Megumi, M. Eng. Massachusetts Institute of Technology

2010-01-01T23:59:59.000Z

309

EIA Data: 2011 United States Residential Sector Key Indicators...  

Open Energy Info (EERE)

Residential Sector Key Indicators and Consumption This datasetis the 2011 United...

310

An Implementation of Key-Based Digital Signal Steganography  

Science Conference Proceedings (OSTI)

A real-life requirement motivated this case study of secure covert communication. An independently researched process is described in detail with an emphasis on implementation issues regarding digital images. A scheme using stego keys to create pseudo-random ...

Toby Sharp

2001-04-01T23:59:59.000Z

311

Interest/Users Group Meeting Proceedings and Key Findings, 2011  

Science Conference Proceedings (OSTI)

This technical update is the summary of the meeting proceedings and key findings for the Fossil Operations and Maintenance Program Area Interest/Users Groups meetings held during 2011. The report represents a culmination of numerous meetings, conferences, users groups, and workshops conducted throughout the year. The document incorporates the meeting logistics and objectives; names of keynote speaker, attendees, and host utility; presentation location, and key findings and recommendations from each meeti...

2011-12-21T23:59:59.000Z

312

Key-and-keyway coupling for transmitting torque  

DOE Patents (OSTI)

The design of an improved key-and-keyway coupling for the transmission of torque is given. The coupling provides significant reductions in stress concentrations in the vicinity of the key and keyway. The keyway is designed with a flat-bottomed u-shaped portion whose inboard end terminates in a ramp which is dished transversely, so that the surface of the ramp as viewed in transverse section defines an outwardly concave arc.

Blue, S.C.; Curtis, M.T.; Orthwein, W.C.; Stitt, D.H.

1975-11-18T23:59:59.000Z

313

Quantum Public-Key Encryption with Information Theoretic Security  

E-Print Network (OSTI)

We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

Jiangyou Pan; Li Yang

2010-06-02T23:59:59.000Z

314

W-like bound entangled states and secure key distillation  

E-Print Network (OSTI)

We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

Remigiusz Augusiak; Pawel Horodecki

2008-11-21T23:59:59.000Z

315

Key distillation from Gaussian states by Gaussian operations  

E-Print Network (OSTI)

We study the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill a secret key secure against any attack from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for key distillation, when Eve is assumed to perform finite-size coherent attacks before the reconciliation process.

M. Navascues; J. Bae; J. I. Cirac; M. Lewenstein; A. Sanpera; A. Acin

2004-05-11T23:59:59.000Z

316

Security of quantum key distribution with arbitrary individual imperfections  

E-Print Network (OSTI)

We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

ystein Mary; Lars Lydersen; Johannes Skaar

2009-03-20T23:59:59.000Z

317

Key Issues for the control of refueling outage duration and costs in PWR Nuclear Power Plants  

SciTech Connect

For several years, EDF, within the framework of the CIDEM1 project and in collaboration with some German Utilities, has undertaken a detailed review of the operating experience both of its own NPP and of foreign units, in order to improve the performances of future units under design, particularly the French-German European Pressurized Reactor (EPR) project. This review made it possible to identify the key issues allowing to decrease the duration of refueling and maintenance outages. These key issues can be classified in 3 categories Design, Maintenance and Logistic Support, Outage Management. Most of the key issues in the design field and some in the logistic support field have been studied and could be integrated into the design of any future PWR unit, as for the EPR project. Some of them could also be adapted to current plants, provided they are feasible and profitable. The organization must be tailored to each country, utility or period: it widely depends on the power production environment, particularly in a deregulation context. (author)

Degrave, Claude [Electricite de France, EDF-SEPTEN, 12-14 avenue Dutrievoz 69628 Villeurbanne Cedex (France)

2002-07-01T23:59:59.000Z

318

A robust on-demand path-key establishment framework via random key predistribution for wireless sensor networks  

Science Conference Proceedings (OSTI)

Secure communication is a necessity for some wireless sensor network (WSN) applications. However, the resource constraints of a sensor render existing cryptographic systems for traditional network systems impractical for a WSN. Random key predistribution ...

Guanfeng Li; Hui Ling; Taieb Znati; Weili Wu

2006-04-01T23:59:59.000Z

319

DEACTIVATION MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT MANAGEMENT The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project management approach, and as such is not addressed. The following specific topics are based on lessons learned during deactivation of DOE facilities.  The Deactivation Mission  The Stabilization/Deactivation "Customer"  Project Approach for a Complex Facility  Establishing the Overall End-State  Viewing Deactivation in Two Phases  Early Decisions  Early Deactivation Tasks  Facility-Specific Commitments  Hazard Reduction  Detailed End-Points  Set Up Method and Criteria  Post-Deactivation S&M Plan

320

Managing the Risks of Climate Change and Terrorism  

SciTech Connect

The article describes challenges to comparative risk assessment, a key approach for managing uncertainty in decision making, across diverse threats such as terrorism and climate change and argues new approaches will be particularly important in addressing decisions related to sustainability.

Rosa, Eugene; Dietz, Tom; Moss, Richard H.; Atran, Scott; Moser, Susanne

2012-04-07T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Effects of Vegetation Structure and Elevation on Lower Keys Marsh Rabbit Density  

E-Print Network (OSTI)

The Lower Keys marsh rabbit (Sylvilagus palustris hefneri, LKMR), 1 of 3 subspecies of Sylvilagus palustris, is endemic to the Lower Florida Keys. The LKMR is listed as an endangered species due to predation by feral and free roaming domestic cats (Felis catus) and raccoons (Procyon lotor), road mortality, effects of storm surges, sea level rise, the small declining metapopulation size, and possible habitat loss from hardwood encroachment. The purpose of this study was to determine the current LKMR density on lands managed by the United States Navy, Naval Air Station Key West and evaluate how vegetation structure and patch elevation effect LKMR population density. I conducted fecal pellet counts to determine LKMR density, collected vegetation data using percent composition of ground cover, Robel range pole, and point-centered quarter methods, and obtained data on patch area and elevation. I used simple linear regression to assess the relationship between LKMR density and 9 measured vegetation characteristics, patch area, and patch elevation to determine which variables have an influence on LKMR density and the relationship between them. In my examination of the simple regression models, 6 out of the 11 variables appeared to influence LKMR population density. The average per patch percent composition of nonliving material and grasses, maximum height of vegetation at the range pole, distance to nearest woody vegetation, patch elevation, and visual obstruction readings (VOR) individually accounted for 26.4%, 30.4% , 18.1%, 8.5%, 6.8%, and 1.4% of the variability in LKMR density, respectively. According to the regression models, LKMR density increased in patches with greater amounts of grasses and with greater distance to woody vegetation. Habitat management is vital to the recovery of the LKMR and needs to focus on providing greater amounts of grasses and reducing the amount of woody vegetation encroachment to enhance LKMR population density.

Dedrickson, Angela

2011-12-01T23:59:59.000Z

322

Safety & Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Coordination Management andor Coordination of APS Site WorkServices Safety & Emergency Management Database Maintenance Personnel Safety & Emergency Management Area...

323

FAQS Qualification Card - Emergency Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emergency Management Emergency Management FAQS Qualification Card - Emergency Management A key element for the Department's Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA). For each functional area, the FAQS identify the minimum technical competencies and supporting knowledge and skills for a typical qualified individual working in the area. FAQC-EmergencyManagement.docx Description Emergency Management Qualification Card More Documents & Publications FAQS Qualification Card - Environmental Restoration

324

FAQS Qualification Card - Senior Technical Safety Manager | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Qualification Card - Senior Technical Safety Manager Qualification Card - Senior Technical Safety Manager FAQS Qualification Card - Senior Technical Safety Manager A key element for the Department's Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA). For each functional area, the FAQS identify the minimum technical competencies and supporting knowledge and skills for a typical qualified individual working in the area. FAQC-SeniorTechnicalSafetyManager.docx Description Senior Technical Safety Manager Qualification Card

325

FAQS Qualification Card - Aviation Manager | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager Manager FAQS Qualification Card - Aviation Manager A key element for the Department's Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA). For each functional area, the FAQS identify the minimum technical competencies and supporting knowledge and skills for a typical qualified individual working in the area. FAQC-AviationManager.docx Description Aviation Manager Qualification Card More Documents & Publications FAQS Qualification Card - Aviation Safety Officer

326

FAQS Qualification Card - Technical Program Manager | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Manager Program Manager FAQS Qualification Card - Technical Program Manager A key element for the Department's Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA). For each functional area, the FAQS identify the minimum technical competencies and supporting knowledge and skills for a typical qualified individual working in the area. FAQC-TechnicalProgramManager.docx Description Technical Program Manager Qualification Card More Documents & Publications FAQS Gap Analysis Qualification Card - Occupational Safety

327

FAQS Qualification Card - Waste Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Waste Management Waste Management FAQS Qualification Card - Waste Management A key element for the Department's Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA). For each functional area, the FAQS identify the minimum technical competencies and supporting knowledge and skills for a typical qualified individual working in the area. FAQC-WasteManagement.docx Description Waste Management Qualification Card More Documents & Publications FAQS Qualification Card - General Technical Base

328

Environmental Management Waste Management Facility (EMWMF) at...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Skip to main content Energy.gov Office of Environmental Management Search form Search Office of Environmental Management Services Waste Management Site & Facility Restoration...

329

Organization Update Assistant Manager for Environmental Management  

NLE Websites -- All DOE Office Websites (Extended Search)

EM-90 Office of the Manager Mark Whitney, Manager Sue Cange, Deputy Manager Brenda Hawks, Senior Technical Advisor Karen Ott, Chief of Staff Karen Forester, Administrative...

330

Federal Energy Management Program: Federal Energy Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Energy Management Program Contacts to someone by E-mail Share Federal Energy Management Program: Federal Energy Management Program Contacts on Facebook Tweet about Federal...

331

Federal Energy Management Program: Energy Management Requirements...  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Requirements by Subject to someone by E-mail Share Federal Energy Management Program: Energy Management Requirements by Subject on Facebook Tweet about Federal...

332

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water-Efficient Irrigation on Facebook Tweet about Federal Energy Management Program: Best...

333

Federal Energy Management Program: Computerized Maintenance Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Computerized Maintenance Management Systems Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and...

334

Quantum key distribution using gaussian-modulated coherent states  

E-Print Network (OSTI)

Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

F. Grosshans; G. Van Assche; J. Wenger; R. Brouri; N. J. Cerf; Ph. Grangier

2003-12-02T23:59:59.000Z

335

Management Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

Immobilization Research Immobilization Research Kurt Gerdes U.S. DOE, Office of Engineering and Technology John Vienna Pacific Northwest National Laboratory Environmental Management May 19, 2009 2009 Hanford - Idaho - Savannah River Technical Exchange 2 Objectives Perform research and development to advance the waste stabilization technology options by through closely- coupled theory, experimentation, and modeling Develop solutions for Hanford, Idaho, Savannah River, and Oak Ridge wastes challenges (along with facilitating management of future wastes) Environmental Management General Approach Balance between near-term incremental technology improvements and long-term transformational solutions Address the requirements for high risk waste streams - high-level tank waste (RPP, SRS)

336

New and Underutilized Technology: Computer Power Management Systems |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Computer Power Management Systems Computer Power Management Systems New and Underutilized Technology: Computer Power Management Systems October 7, 2013 - 9:08am Addthis The following information outlines key deployment considerations for computer power management systems within the Federal sector. Benefits Computer power management systems include network-based software that manages computer power consumption by automatically putting them in standby, hibernation, or other low energy consuming state without interfering with user productivity or IT functions. Application Computer power management systems are applicable in most building categories with high computer counts. Key Factors for Deployment Life-cycle cost effectiveness studies are recommended prior to deployment. Ranking Criteria Federal energy savings, cost-effectiveness, and probability of success are

337

Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar July 12, 2010 - 3:51pm Addthis APS will install solar photovoltaic panels like these in Castro Valley, Calif. for a pilot project studying distributed energy in Flagstaff, Ariz. | Photo courtesy of APS APS will install solar photovoltaic panels like these in Castro Valley, Calif. for a pilot project studying distributed energy in Flagstaff, Ariz. | Photo courtesy of APS Nestled in the mountains of northern Arizona and just 75 miles from Grand Canyon National Park, the city of Flagstaff, Ariz. is an ideal city for the Arizona Public Service (APS) to pilot a high concentration of solar photovoltaic energy systems. "Flagstaff is unique electrically," says Eran Mahrer, Director of Renewable

338

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of A Key Enzyme to the Potency of an Anticancer Agent A Key Enzyme to the Potency of an Anticancer Agent Print Wednesday, 28 May 2008 00:00 Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up

339

Property:Specializations, Capabilities, and Key Facility Attributes Not  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere Jump to: navigation, search Property Name Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere Property Type Text Pages using the property "Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere" Showing 25 pages using this property. 1 11-ft Wave Flume Facility + Glass window 6 6-ft Wave Flume Facility + Glass window A Alden Large Flume + This is a recirculating flume facility, so a constant velocity can be maintained indefinitely. This allows collection of a much greater amount of data than possible in tow tanks. Alden's biologists are highly experienced in assessing the impacts of generation devices on fish and the facilities allow for accurate testing with fish in a highly controlled environment.

340

Special Presentation: Key Findings from the Barrier Immune Radio  

NLE Websites -- All DOE Office Websites (Extended Search)

Special Presentation: Key Findings from the Barrier Immune Radio Special Presentation: Key Findings from the Barrier Immune Radio Communications Project Speaker(s): Francis Rubinstein Girish Ghatikar Peter Haugen Date: November 29, 2007 - 12:00pm Location: 90-3122 The Barrier Immune Radio Communications (BIRC) Project was established in January 2007 by the Demand Response Emerging Technologies Program (DRETD) to identify radio frequency technologies that could enable the widespread deployment of Demand Response strategies in buildings. Researchers from Lawrence Berkeley National Laboratory and Lawrence Livermore National Laboratory will present the key findings from this project in a one-hour presentation. Researchers found that several of the RF technologies tested at LBNL's Molecular Foundry building were able to provide sufficiently

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Small Businesses Key in Hydropower Tech Advancement | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Businesses Key in Hydropower Tech Advancement Businesses Key in Hydropower Tech Advancement Small Businesses Key in Hydropower Tech Advancement September 6, 2011 - 2:59pm Addthis Earlier today, the Department of Energy and the Department of Interior announced nearly $17 million in funding over the next three years to advance hydropower technology. The funding announced today will go to sixteen innovative projects around the country, including sustainable small hydro projects, like the ones from Hydro Green Energy, a small business that handles hydroelectric power generation and power and communication line construction. The company, which has eight employees currently, has been awarded funding for two projects. Near Space Systems, a Colorado Springs-based company, is a service-disabled veteran-owned business with a manufacturing focus that's

342

Energy Storage: The Key to a Reliable, Clean Electricity Supply |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Storage: The Key to a Reliable, Clean Electricity Supply Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy storage technology offers a number of economic and environmental benefits. Improved energy storage technology offers a number of economic and environmental benefits. Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs What does this project do? ARPA-E's GRIDS program is investing in new technologies that make storing energy cheaper and more efficient. Energy storage isn't just for AA batteries any more. Thanks to investments from the Department's Advanced Research Projects Agency-Energy (ARPA-E), energy storage may soon play a bigger part in our electricity

343

Technology Key to Harnessing Natural Gas Potential | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa Energy Corp. in Houston, Texas. Proinlosa is a company in the wind turbine manufacturing supply chain that develops tower parts and has benefitted from the Production Tax Credit (PTC). | Photo courtesy of Keri Fulton. Deputy Secretary Daniel Poneman tours Proinlosa Energy Corp. in Houston, Texas. Proinlosa is a company in the wind turbine manufacturing supply chain that develops tower parts and has benefitted from the Production Tax Credit (PTC). | Photo courtesy of Keri Fulton. Daniel B. Poneman Daniel B. Poneman Deputy Secretary of Energy What does this project do? Builds on President Obama's call for a new era for American energy

344

Sierra Geothermal's Key Find in Southern Nevada | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Paul Lester Communications Specialist for the Office of Energy Efficiency and Renewable Energy In May 2010, Sierra Geothermal determined temperature at the bottom of a well drilled at the company's Alum project near Silver Peak, Nev., was hot enough for commercial-sized geothermal energy production - measured as 147

345

Transportation Energy Futures Study: The Key Results and Conclusions  

Open Energy Info (EERE)

Transportation Energy Futures Study: The Key Results and Conclusions Transportation Energy Futures Study: The Key Results and Conclusions Webinar Home > Groups > OpenEI Community Central Graham7781's picture Submitted by Graham7781(1992) Super contributor 1 May, 2013 - 11:38 This webinar will outline the key results and conclusions from EERE's Transportation Energy Futures study, which highlights underexplored opportunities to reduce petroleum use and greenhouse gas emissions from the U.S. transportation sector. There will be time for questions from attendees at the end of the webinar. Principal Deputy Assistant Secretary Mike Carr will introduce the study and provide context on EERE's transportation energy strategy. In his role with EERE, Mike provides leadership direction on cross-cutting activities in EERE's portfolio. In particular, he is using his experience in policy

346

Sierra Geothermal's Key Find in Southern Nevada | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Paul Lester Communications Specialist, Office of Energy Efficiency and Renewable Energy In May 2010, Sierra Geothermal determined temperature at the bottom of a well drilled at the company's Alum project near Silver Peak, Nev., was hot enough for commercial-sized geothermal energy production - measured as 147

347

Worldwide Trends in Energy Use and Efficiency: Key Insights from  

Open Energy Info (EERE)

Worldwide Trends in Energy Use and Efficiency: Key Insights from Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Focus Area: Power Plant Efficiency Topics: Potentials & Scenarios Website: www.iea.org/papers/2008/indicators_2008.pdf Equivalent URI: cleanenergysolutions.org/content/worldwide-trends-energy-use-and-effic Language: English Policies: "Regulations,Deployment Programs" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property.

348

Energy Storage: The Key to a Reliable, Clean Electricity Supply |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy storage technology offers a number of economic and environmental benefits. Improved energy storage technology offers a number of economic and environmental benefits. Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs What does this project do? ARPA-E's GRIDS program is investing in new technologies that make storing energy cheaper and more efficient. Energy storage isn't just for AA batteries any more. Thanks to investments from the Department's Advanced Research Projects Agency-Energy (ARPA-E), energy storage may soon play a bigger part in our electricity

349

Single, Key Gene Discovery Could Streamline Production of Biofuels |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON, DC -- A team of researchers at the Department of Energy's BioEnergy Science Center (BESC) have pinpointed the exact, single gene that controls ethanol production capacity in a microorganism. This discovery could be the missing link in developing biomass crops that produce higher concentrations of ethanol at lower costs. "The Department of Energy relies on the scientific discoveries of its labs and research centers to improve the production of clean energy sources," said Energy Secretary Steven Chu. "This discovery is an important step in developing biomass crops that could increase yield of

350

Building MRV Standards and Capacity in Key Countries | Open Energy  

Open Energy Info (EERE)

MRV Standards and Capacity in Key Countries MRV Standards and Capacity in Key Countries Jump to: navigation, search Name Building MRV Standards and Capacity in Key Countries Agency/Company /Organization World Resources Institute (WRI) Sector Climate Focus Area Renewable Energy Topics Implementation Website http://www.wri.org/topics/mrv Program Start 2011 Program End 2014 Country Brazil, Colombia, Ethiopia, India, South Africa, Thailand South America, South America, Eastern Africa, Southern Asia, Southern Africa, South-Eastern Asia References World Resources Institute (WRI)[1] Program Overview Developing countries will be required to measure, report, and verify (MRV) mitigation actions according to international guidelines, but few have the capacity to do so. The goal of this project is to build the capacity of a

351

Florida Keys El Coop Assn, Inc | Open Energy Information  

Open Energy Info (EERE)

Keys El Coop Assn, Inc Keys El Coop Assn, Inc Jump to: navigation, search Name Florida Keys El Coop Assn, Inc Place Florida Utility Id 6443 Utility Location Yes Ownership C NERC Location FRCC NERC FRCC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Rate Code 1 - Residential Service Residential Rate Code 2 - Commercial Service (General Service Non-Demand) Commercial Rate Code 3 - Commercial Service (General Service Demand) Commercial Average Rates Residential: $0.1210/kWh Commercial: $0.1220/kWh Industrial: $0.1140/kWh

352

Physical key-protected one-time pad  

E-Print Network (OSTI)

We describe an encrypted communication principle that can form a perfectly secure link between two parties without electronically saving either of their keys. Instead, cryptographic key bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 cubic millimeter scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any random bits without fundamentally altering the entire key space. Beyond the demonstrated communication scheme, our ability to securely couple the randomness contained within two unique physical objects may help strengthen the hardware for a large class of cryptographic protocols, which ...

Horstmeyer, Roarke; Vellekoop, Ivo; Yang, Changhuei

2013-01-01T23:59:59.000Z

353

SECOQC White Paper on Quantum Key Distribution and Cryptography  

E-Print Network (OSTI)

The SECOQC White Paper on Quantum Key Distribution and Cryptography is the outcome on a thorough consultation and discussion among the participants of the European project SECOQC (www.secoqc.net). This paper is a review article that attempts to position Quantum Key Distribution (QKD) in terms of cryptographic applications. A detailed comparison of QKD with the solutions currently in use to solve the key distribution problem, based on classical cryptography, is provided. We also detail how the work on QKD networks lead within SECOQC will allow the deployment of long-distance secure communication infrastructures based on quantum cryptography. The purpose of the White Paper is finally to promote closer collaboration between classical and quantum cryptographers. We believe that very fruitful research, involving both communities, could emerge in the future years and try to sketch what may be the next challenges in this direction.

Romain Alleaume; Jan Bouda; Cyril Branciard; Thierry Debuisschert; Mehrdad Dianati; Nicolas Gisin; Mark Godfrey; Philippe Grangier; Thomas Langer; Anthony Leverrier; Norbert Lutkenhaus; Philippe Painchault; Momtchil Peev; Andreas Poppe; Thomas Pornin; John Rarity; Renato Renner; Gregoire Ribordy; Michel Riguidel; Louis Salvail; Andrew Shields; Harald Weinfurter; Anton Zeilinger

2007-01-23T23:59:59.000Z

354

Steam Generator Management Program: Flaw Handbook Calculator  

Science Conference Proceedings (OSTI)

The EPRI Steam Generator Management Program: Steam Generator Degradation Specific Flaw Handbook v1.0 defines burst pressure equations for steam generator tubes with various degradation morphologies, and the EPRI Steam Generator Management Program: Steam Generator Integrity Assessment Guidelines (1019038) describes a probabilistic evaluation process which can be used to account for key input parameter uncertainties. The Flaw Handbook Calculator software is an automated Microsoft Excelspreadsheet which cal...

2010-04-20T23:59:59.000Z

355

Energy Critical Infrastructure and Key Resources Sector-Specific  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) May 2007 Department of Energy Energy Sector Government Coordinating Council Letter of Support i ii Energy Sector-Specific Plan (Redacted) Energy Sector Coordinating Councils Letter of Concurrence The National Infrastructure Protection Plan (NIPP) provides the unifying structure for the integration of federal critical infrastructures and key resources (CI/KR) protection efforts into a single national program. The NIPP includes an overall framework integrating federal programs and activities that are currently underway in the various sectors, as well as new and developing CI/KR protection efforts. The Energy

356

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

Actions Actions < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport sector, choosing from relevant resources to achieve a comprehensive action

357

Tomographic Quantum Cryptography: Equivalence of Quantum and Classical Key Distillation  

E-Print Network (OSTI)

The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.

Dagmar Bruss; Matthias Christandl; Artur Ekert; Berthold-Georg Englert; Dagomir Kaszlikowski; Chiara Macchiavello

2003-03-31T23:59:59.000Z

358

Security bounds for continuous variables quantum key distribution  

E-Print Network (OSTI)

Security bounds for key distribution protocols using coherent and squeezed states and homodyne measurements are presented. These bounds refer to (i) general attacks and (ii) collective attacks where Eve interacts individually with the sent states, but delays her measurement until the end of the reconciliation process. For the case of a lossy line and coherent states, it is first proven that a secure key distribution is possible up to 1.9 dB of losses. For the second scenario, the security bounds are the same as for the completely incoherent attack.

Miguel Navascues; Antonio Acin

2004-07-19T23:59:59.000Z

359

Work Manager  

Science Conference Proceedings (OSTI)

A real-time control system has been developed and deployed nationally to support BTs work management programme. This paper traces the history, system architecture, development, deployment and service aspects of this very large programme. Many ...

G. J. Garwood

1997-01-01T23:59:59.000Z

360

Management Solution  

E-Print Network (OSTI)

MEMO: Request for proposal for Computer-Aided Facilities and Maintenance Management application software; professional services; development services for interfaces to Financial Management and Human Resources systems; configuration, test, train, maintenance and support services to implement and maintain a CAFM Solution for the California Administrative Office of the Courts, the Trial Courts, the Appellate Courts and the Judicial Council, known as The AOC Group. You are invited to review and respond to the attached Request for Proposal (RFP):

Rfp Number Isdcafm

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Airflow Management  

Science Conference Proceedings (OSTI)

This technical update provides an overview of airflow management, with an emphasis on how reduced airflow can improve energy efficiency in data centers. Airflow management within a data center can have a dramatic impact on energy efficiency. Typically, much more cold air circulates within conventional data centers than is actually needed to cool equipment related to information and communication technology (ICT). It is not uncommon for facilities to supply more than two to three times the minimum require...

2011-12-14T23:59:59.000Z

362

Stormwater Management  

E-Print Network (OSTI)

According to the EPA, pollutants in stormwater discharges have a significant effect on water quality. The Clean Water Act and its amendments regulate certain discharges of stormwater. Learn which sources are regulated and what can be done to control stormwater and the pollution it can cause. This publication includes a glossary of key terms and answers to frequently asked questions.

Jaber, Fouad

2008-10-23T23:59:59.000Z

363

Key ACA Terms A quick reference of frequently used terms  

E-Print Network (OSTI)

a comprehensive package of items and services, known as essential health benefits. Essential health benefits must services, including behavioral health treatment; prescription drugs; rehabilitative and habilita- tive services and devices; laboratory services; preventive and wellness services and chronic disease management

Acton, Scott

364

Gathering Storm Report Captures Data, Minds & Makes 10 Key ...  

Science Conference Proceedings (OSTI)

Oct 12, 2013 ... National Security, a bipartisan group of experienced .... the most fertile environment for new and re- ..... Sciences Laboratory, Manager of ...... agency for high energy physics, nuclear physics, and fusion energy sciences and...

365

The S/KEY One-Time Password System  

Science Conference Proceedings (OSTI)

This document describes the S/KEY* One-Time Password system as released for public use by Bellcore and as described in reference [3]. A reference implementation and documentation are available by anonymous ftp from ftp.bellcore.com in the directories ...

N. Haller

1995-02-01T23:59:59.000Z

366

Quantum Key Distribution and String Oblivious Transfer in Noisy Channels  

Science Conference Proceedings (OSTI)

We prove the unconditional security of a quantum key distribution (QKD) protocol on a noisy channel against the most general attack allowed by quantum physics. We use the fact that in a previous paper we have reduced the proof of the unconditionally ...

Dominic Mayers

1996-08-01T23:59:59.000Z

367

The Key Coal Producers ONLINE SUPPORTING MATERIALS to  

E-Print Network (OSTI)

The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

Patzek, Tadeusz W.

368

What were the key energy commodity price trends in 2011?  

Reports and Publications (EIA)

Energy commodity price trends varied widely during 2011. Crude oil and petroleum products prices increased during 2011, while natural gas, coal, and electricity prices declined. This article provides an overview of key energy commodity price trends in 2011 based on prices seen in futures markets.

2012-02-14T23:59:59.000Z

369

Robust secret key based authentication scheme using smart cards  

Science Conference Proceedings (OSTI)

User authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. Recently, Chen et al. proposed an improvement on the SAS-like password ... Keywords: authentication, cryptography, secret key, smart card

Eun-Jun Yoon; Kee-Young Yoo

2005-11-01T23:59:59.000Z

370

An improved anonymous authentication and key exchange scheme  

Science Conference Proceedings (OSTI)

Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.'s scheme did not provide the user ...

Kyung-kug Kim; Myung-Hwan Kim

2012-09-01T23:59:59.000Z

371

Quantum key distribution system clocked at 2 GHz  

E-Print Network (OSTI)

An improved quantum key distribution test system operating at clock rates of up to 2GHz using a specially adapted commercially available silicon single photon avalanche diode is presented. The use of improved detectors has improved the fibre-based test system performance in terms of transmission distance and quantum bit error rate.

K. J. Gordon; V. Fernandez; G. S. Buller; I. Rech; S. D. Cova; P. D. Townsend

2006-05-08T23:59:59.000Z

372

Illustrated plant identification keys: An interactive tool to learn botany  

Science Conference Proceedings (OSTI)

An Interactive Dichotomous Key (IDK) for 390 taxa of vascular plants from the Ria de Aveiro, available on a website, was developed to help teach botany to school and universitary students. This multimedia tool includes several links to Descriptive and ... Keywords: Applications in subject areas, Post-secondary education, Secondary education, Teaching/learning strategies

Helena Silva; Rosa Pinho; Lsia Lopes; Antnio J. A. Nogueira; Paulo Silveira

2011-05-01T23:59:59.000Z

373

A Verifiable Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

construction of a verifiable ran- dom function (VRF) on groups equipped with a bilinear mapping. Our to a VRF in contrast to prior works of Micali-Rabin-Vadhan [MRV99] and Lysyanskaya [Lys02]. Our proofs in [BB04a] to construct an identity based encryption scheme. Our VRF's proofs and keys have constant size

Dodis, Yevgeniy

374

A Verifiable Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

#cient construction of a verifiable ran­ dom function (VRF) on groups equipped with a bilinear mapping. Our to a VRF in contrast to prior works of Micali­Rabin­Vadhan [MRV99] and Lysyanskaya [Lys02]. Our proofs in [BB04a] to construct an identity based encryption scheme. Our VRF's proofs and keys have constant size

Dodis, Yevgeniy

375

Verifiable Random Functions from Identity-Based Key Encapsulation  

Science Conference Proceedings (OSTI)

We propose a methodology to construct verifiable random functions from a class of identity based key encapsulation mechanisms (IB-KEM) that we call VRF suitable. Informally, an IB-KEM is VRF suitable if it provides what we call unique decryption ...

Michel Abdalla; Dario Catalano; Dario Fiore

2009-04-01T23:59:59.000Z

376

A Veri able Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

?? Abstract. We give a simple and e?cient construction of a veri#12;able random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [MRV99, Lys02], it avoids reasonable given cur- rent state of knowledge. For small message spaces, our VRF's proofs and keys have

377

A simple threshold authenticated key exchange from short secrets  

Science Conference Proceedings (OSTI)

This paper brings the password-based authenticated key exchange (PAKE) problem closer to practice. It takes into account the presence of firewalls when clients communicate with authentication servers. An authentication server can indeed be seen as two ... Keywords: password-based authentication, threshold protocols

Michel Abdalla; Olivier Chevassut; Pierre-Alain Fouque; David Pointcheval

2005-12-01T23:59:59.000Z

378

Extracting Key Factors to Design Applications in Ambient Intelligence Environment  

Science Conference Proceedings (OSTI)

In an ambient intelligence environment, the design of applications influences the users behavior heavily. The purpose of this paper is to provide key factors considered necessary in developing those applications. We developed four applications applied ... Keywords: ambient feedback, persuasive technology, behavior modification, emotional engagement

Hiroaki Kimura; Tatsuo Nakajima

2008-12-01T23:59:59.000Z

379

news and views A key issue for hydrogen storage materi-  

E-Print Network (OSTI)

news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

Palumbi, Stephen

380

Page 1 of 4 Creating and Submitting a Key Request  

E-Print Network (OSTI)

of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

Howitt, Ivan

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS  

E-Print Network (OSTI)

BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS Gerald A. Navratil Columbia University/FESAC Burning Plasma Strategy Dec 2002 NRC/NAS Interim Report on Burning Plasmas Jan 30, 2003 DOE of the physics of burning plasma, advance fusion technology, and contribute to the development of fusion energy

382

Key issues in ITER diagnostics: Problems and solutions (invited)  

Science Conference Proceedings (OSTI)

The key problems associated with designing diagnostic systems for the International Thermonuclear Experimental Reactor (ITER) are identified and representative solutions are described. The plans for dealing with some outstanding issues are briefly presented. The detailed work is specific to the ITER

A. E. Costley; Members of the ITER Joint Central Team and Home Teams

1999-01-01T23:59:59.000Z

383

Quantum key distribution with a reference quantum state  

SciTech Connect

A new quantum key distribution protocol stable at arbitrary losses in a quantum communication channel has been proposed. For the stability of the protocol, it is of fundamental importance that changes in states associated with losses in the communication channel (in the absence of the eavesdropper) are included in measurements.

Molotkov, S. N., E-mail: molotkov@issp.ac.ru [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

2011-11-15T23:59:59.000Z

384

Generic Security Proof of Quantum Key Exchange using Squeezed States  

E-Print Network (OSTI)

Recently, a Quantum Key Exchange protocol that uses squeezed states was presented by Gottesman and Preskill. In this paper we give a generic security proof for this protocol. The method used for this generic security proof is based on recent work by Christiandl, Renner and Ekert.

Karin Poels; Pim Tuyls; Berry Schoenmakers

2005-08-09T23:59:59.000Z

385

The Key Renewal Theorem for a Transient Markov Chain  

E-Print Network (OSTI)

We consider a time-homogeneous Markov chain $X_n$, $n\\ge0$, valued in ${\\bf R}$. Suppose that this chain is transient, that is, $X_n$ generates a $\\sigma$-finite renewal measure. We prove the key renewal theorem under condition that this chain has asymptotically homogeneous at infinity jumps and asymptotically positive drift.

Korshunov, Dmitry

2007-01-01T23:59:59.000Z

386

Essential lack of security proof in quantum key distribution  

E-Print Network (OSTI)

All the currently available unconditional security proofs on quantum key distribution, in particular for the BB84 protocol and its variants including continuous-variable ones, are invalid or incomplete at many points. In this paper we discuss some of the main known problems, particularly those on operational security guarantee and error correction. Most basic are the points that there is no security parameter in such protocols and it is not the case the generated key is perfect with probability $\\geq 1-\\epsilon$ under the trace distance criterion $d\\leq\\epsilon$, which is widely claimed in the technical and popular literature. The many serious security consequences of this error about the QKD generated key would be explained, including practical ramification on achievable security levels. It will be shown how the error correction problem alone may already defy rigorous quantitative analysis. Various other problems would be touched upon. It is pointed out that rigorous security guarantee of much more efficient quantum cryptosystems may be obtained by abandoning the disturbance-information tradeoff principle and utilizing instead the known KCQ (keyed communication in quantum noise) principle in conjunction with a new DBM (decoy bits method) principle that will be detailed elsewhere.

Horace P. Yuen

2013-10-02T23:59:59.000Z

387

Key website factors in e-business strategy  

Science Conference Proceedings (OSTI)

The design of a quality website, as part of e-business strategy, has become a key element for success in the online market. This article analyzes the main factors that must be taken into account when designing a commercial website, concentrating on the ... Keywords: Accessibility, Content, Navigability, Speed, Web Assessment Index (WAI), Website

Blanca HernNdez; Julio JimNez; M. Jos MartN

2009-10-01T23:59:59.000Z

388

Environmental Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Video Community, Environment Environmental Stewardship Environmental Protection Environmental Management System Environmental Management System An Environmental...

389

Quality System Documentation Management  

Science Conference Proceedings (OSTI)

Quality System Documentation Management. ... Minutes, summaries, or notes from Management Meetings of significance are archived here. ...

2012-08-21T23:59:59.000Z

390

NIST Performance Management Program  

Science Conference Proceedings (OSTI)

NIST Performance Management Program. Performance ... appraisal. APMS and FWS Performance Management Programs: ...

2010-10-05T23:59:59.000Z

391

Presidential Management Fellows Program  

Science Conference Proceedings (OSTI)

Presidential Management Fellows Program. Summary: About the Program: The Presidential Management Fellows (PMF ...

2012-08-31T23:59:59.000Z

392

Computerized training management system  

DOE Patents (OSTI)

A Computerized Training Management System (CTMS) is disclosed for providing a procedurally defined process that is employed to develop accreditable performance based training programs for job classifications that are sensitive to documented regulations and technical information. CTMS is a database that links information needed to maintain a five-phase approach to training-analysis, design, development, implementation, and evaluation independent of training program design. CTMS is designed using R-Base{trademark}, an-SQL compliant software platform. Information is logically entered and linked in CTMS. Each task is linked directly to a performance objective, which, in turn, is linked directly to a learning objective; then, each enabling objective is linked to its respective test items. In addition, tasks, performance objectives, enabling objectives, and test items are linked to their associated reference documents. CTMS keeps all information up to date since it automatically sorts, files and links all data; CTMS includes key word and reference document searches. 18 figs.

Rice, H.B.; McNair, R.C.; White, K.; Maugeri, T.

1998-08-04T23:59:59.000Z

393

Computerized training management system  

DOE Patents (OSTI)

A Computerized Training Management System (CTMS) for providing a procedurally defined process that is employed to develop accreditable performance based training programs for job classifications that are sensitive to documented regulations and technical information. CTMS is a database that links information needed to maintain a five-phase approach to training-analysis, design, development, implementation, and evaluation independent of training program design. CTMS is designed using R-Base.RTM., an-SQL compliant software platform. Information is logically entered and linked in CTMS. Each task is linked directly to a performance objective, which, in turn, is linked directly to a learning objective; then, each enabling objective is linked to its respective test items. In addition, tasks, performance objectives, enabling objectives, and test items are linked to their associated reference documents. CTMS keeps all information up to date since it automatically sorts, files and links all data; CTMS includes key word and reference document searches.

Rice, Harold B. (Franklin Furnace, OH); McNair, Robert C. (East Setauket, NY); White, Kenneth (Shirley, NY); Maugeri, Terry (Wading River, NY)

1998-08-04T23:59:59.000Z

394

IS downsizing survivor's career management attitudes  

Science Conference Proceedings (OSTI)

IS downsizing is a significant tool of management in the 1990's. A key element in downsizing success is how it is perceived by employees. Still, no widely published study has examined the attitudes of IS survivors to downsizing. Moreover, in the age ...

James J. Jiang; Stephen T. Margulis; Gary Klein

1997-07-01T23:59:59.000Z

395

An integrated approach to process and service management  

Science Conference Proceedings (OSTI)

Any enterprise exists to create and capture value, and much of this value is created through processes and services. Given the heavy dependency of processes on information and IT, the chief information officer (CIO) has a key role to play in ensuring ... Keywords: Information strategy, Information systems, Process management, Service management

Forbes Gibb; Steven Buchanan; Sameer Shah

2006-02-01T23:59:59.000Z

396

Ursa: Scalable Load and Power Management in Cloud Storage Systems  

Science Conference Proceedings (OSTI)

Enterprise and cloud data centers are comprised of tens of thousands of servers providing petabytes of storage to a large number of users and applications. At such a scale, these storage systems face two key challenges: (1) hot-spots due to the dynamic ... Keywords: Load management, linear programming, optimization, power management, storage

Gae-Won You; Seung-Won Hwang; Navendu Jain

2013-03-01T23:59:59.000Z

397

A generic architecture for autonomic service and network management  

Science Conference Proceedings (OSTI)

As the Internet evolves into an all-IP communication infrastructure, a key issue to consider is that of creating and managing IP-based services with efficient resource utilization in a scalable, flexible, and automatic way. In this paper, we present ... Keywords: Autonomic service management, Bandwidth sharing, DiffServ/MPLS networks, Quality of service, Service level agreement

Yu Cheng; Ramy Farha; Myung Sup Kim; Alberto Leon-Garcia; James Won-Ki Hong

2006-11-01T23:59:59.000Z

398

Environmental Restoration Information Resource Management Program Plan  

SciTech Connect

The Environmental Restoration Information Resources Management (ER IRM) Program Plan defines program requirements, organizational structures and responsibilities, and work breakdown structure and to establish an approved baseline against which overall progress of the program as well as the effectiveness of its management will be measured. This plan will guide ER IRM Program execution and define the program`s essential elements. This plan will be routinely updated to incorporate key decisions and programmatic changes and will serve as the project baseline document. Environmental Restoration Waste Management Program intersite procedures and work instructions will be developed to facilitate the implementation of this plan.

Not Available

1994-09-01T23:59:59.000Z

399

TYPiMatch: type-specific unsupervised learning of keys and key values for heterogeneous web data integration  

Science Conference Proceedings (OSTI)

Instance matching and blocking, a preprocessing step used for selecting candidate matches, require determining the most representative attributes of instances called keys, based on which similarities between instances are computed. We show that for the ... Keywords: heterogeneous web data, information integration, unsupervised learning

Yongtao Ma; Thanh Tran

2013-02-01T23:59:59.000Z

400

The United States Industrial Electric Motor Systems Market Opportunities Assessment: Key Results  

E-Print Network (OSTI)

This paper summarizes the findings of the U. S. Industrial Electric Motor Systems Market Opportunities Assessment. The Market Assessment was sponsored by the U. S. Department of Energy. The project's principal objectives were to create a detailed portrait of the inventory of motor systems currently in use in US industrial facilities, estimate motor system energy use and potential for energy savings. The research and analysis to support these objectives consisted primarily of on-site motor system inventories of a probability sample of 254 manufacturing facilities nationwide. In addition to characterizing the motor systems in use, the research effort also gathered detailed information on motor system management and purchasing practices. This paper presents key findings from the Market Assessment in regard to patterns of motor energy use, saturation of energy efficiency measures such as efficient motors and adjustable speed drives, and motor system purchase and maintenance practices.

Rosenberg, M.

1999-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

402

Contributions to Key Energy Conversion Technologies and Advanced Methods  

NLE Websites -- All DOE Office Websites (Extended Search)

Contributions to Key Energy Conversion Technologies and Advanced Methods Contributions to Key Energy Conversion Technologies and Advanced Methods for Optimum Energy Systems Design and Planning Speaker(s): Daniel Favrat Date: February 27, 2003 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Kristina LaCommare This presentation reviews some of EPFL-LENI's recent contributions to advanced cogeneration and heat pump technologies as well as to new system design approaches based on multimodal evolutionar algorithms. In the field of cogeneration, theoretical and experimental results show that gas engines with unscavenged ignition prechambers can, without the need of a catalyst, achieve high efficiencies with reasonable emissions with both natural gas and biogas. Combination with Organic Rankine Cycle (ORC) heat recovery

403

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 23, 2012 - 8:28pm January 23, 2012 - 8:28pm Addthis THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE January 23, 2012 President Obama Announces More Key Administration Posts WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Erin C. Conaton - Under Secretary of Defense for Personnel and Readiness, Department of Defense Scott H. DeLisi - Ambassador to the Republic of Uganda, Department of State Deborah Delisle - Assistant Secretary for Elementary and Secondary Education, Department of Education Tracey Ann Jacobson - Ambassador to the Republic of Kosovo, Department of State James J. Jones - Assistant Administrator for Toxic Substances, Environmental Protection Agency Frank Kendall III - Under Secretary of Defense for Acquisition,

404

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to  

NLE Websites -- All DOE Office Websites (Extended Search)

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to policy makers on energy codes and to offer guidance on how policy makers can support the creation of statewide energy efficiency goals and standards. In addition, this guide will help instruct policy makers on how they can: » Encourage the adoption of statewide codes. » Establish energy code awareness programs. » Support enforcement of and compliance with energy codes. » Participate in the development of national codes and standards. » Determine the viability of the new code. Building TECHnOlOgiES PROgRAM Resource Guide for Policy Makers PREPAREd By Building Energy Codes Program The u.S. department of Energy's (uSdOE) Building Energy Codes Program (BECP) is an information resource on national energy codes. They work with other government

405

Key West, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

(Redirected from Key West, FL) (Redirected from Key West, FL) Jump to: navigation, search Equivalent URI DBpedia Coordinates 24.5557025°, -81.7825914° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":24.5557025,"lon":-81.7825914,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

406

Thailand-Key Results and Policy Recommendations for Future Bioenergy  

Open Energy Info (EERE)

and Policy Recommendations for Future Bioenergy and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Agency/Company /Organization Food and Agriculture Organization of the United Nations Sector Land Focus Area Biomass, Agriculture Topics Co-benefits assessment, Policies/deployment programs, Background analysis Resource Type Lessons learned/best practices Website http://www.fao.org/docrep/013/ Country Thailand UN Region South-Eastern Asia References Thailand-Key Results and Policy Recommendations for Future Bioenergy Development[1] Abstract "The Government of Thailand, through its Alternative Energy Development Plan, has set a target to increase biofuel production to five billion

407

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 27, 2011 - 3:25pm July 27, 2011 - 3:25pm Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: David Danielson - Assistant Secretary for Energy Efficiency and Renewable Energy, Department of Energy Dot Harris - Director of the Office of Minority Economic Impact, Department of Energy President Obama said, "I am honored that these talented individuals have decided to join this Administration and serve our country. I look forward to working with them in the months and years to come." President Obama announced his intent to nominate the following individuals to key Administration posts: David Danielson, Nominee for Assistant Secretary for Energy Efficiency and Renewable Energy, Department of Energy

408

Key Accomplishments @ Catalysis: Reactivity and Structure Group | Chemistry  

NLE Websites -- All DOE Office Websites (Extended Search)

Recent Key Accomplishments Recent Key Accomplishments WGS: Importance of the Metal-Oxide Interface in Catalysis: In Situ Studies of the Water-Gas Shift Reaction by Ambient-Pressure X-ray Photoelectron Spectroscopy A New Type of Strong Metal-Support Interaction and the Production of H-2 through the Transformation of Water on Pt/CeO2(111) and Pt/CeOx/TiO2(110) Catalysts In situ studies of CeO2-supported Pt, Ru, and Pt-Ru alloy catalysts for the water-gas shift reaction: Active phases and reaction intermediates In situ/operando studies for the production of hydrogen through the water-gas shift on metal oxide catalysts Mechanistic understanding of WGS catalysts from first principles: Au(111) Supported Oxide Nanoparticles Theoretical catalyst optimization of WGS catalysts: Cu(111) supported oxide nanostructures

409

Quantum key distribution using intra-particle entanglement  

E-Print Network (OSTI)

We propose the use of intra-particle entanglement to enhance the security of a practical implementation of the Bennett-Brassard-1984 (BB84) quantum key distribution scheme. Intra-particle entanglement is an attractive resource since it can be easily generated using only linear optics. Security is studied under a simple model of incoherent attack for protocols involving two or all five mutually unbiased bases. In terms of efficiency of secret key generation and tolerable error rate, the latter is found to be superior to the former. We find that states that allow secrecy distillation are necessarily entangled, though they may be local. Since more powerful attacks by Eve obviously exist, our result implies that security is a strictly stronger condition than entanglement for these protocols.

S. Adhikari; Dipankar Home; A. S. Majumdar; A. K. Pan; Akshata Shenoy H.; R. Srikanth

2011-01-04T23:59:59.000Z

410

Public key Steganography Using Discrete Cross-Coupled Chaotic Maps  

E-Print Network (OSTI)

By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

2012-11-01T23:59:59.000Z

411

Key Factors in Displacement Ventilation Systems for Better IAQ  

E-Print Network (OSTI)

This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect air-quality in rooms of multi-polluting heat sources. Results show that it is very important to determine the suitable air-intemperature , air-inflow, and heat source quantity and dispersion, to obtain better displacement ventilation results.

Wang, X.; Chen, J.; Li, Y.; Wang, Z.

2006-01-01T23:59:59.000Z

412

Extensible router for multi-user quantum key distribution network  

E-Print Network (OSTI)

A feasible quantum key distribution (QKD) network scheme has been proposed with the wavelength routing. An apparatus called "quantum router", which is made up of many wavelength division multiplexers, can route the quantum signals without destroying their quantum states. Combining with existing point-to-point QKD technology, we can setup a perfectly QKD star-network. A simple characteristic and feasibility of this scheme has also been obtained.

Zhang, T; Han, Z F; Mo, X F; Guo, Guang-Can; Han, Zheng-Fu; Mo, Xiao-Fan; Zhang, Tao

2006-01-01T23:59:59.000Z

413

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up The smell of chlorine is unmistakable. It's in the swimming pool, in household bleach, and sometimes the faint odor of chlorine rises up from your tap water. But chlorine is more than a purifier and a disinfectant. It's found almost everywhere in nature-in table salt, dissolved in the ocean, and as a key ingredient in biosynthesis, a vital part of the metabolism of all living organisms.

414

Key Elements of and Materials Performance Targets for Highly Insulating  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Elements of and Materials Performance Targets for Highly Insulating Key Elements of and Materials Performance Targets for Highly Insulating Window Frames Title Key Elements of and Materials Performance Targets for Highly Insulating Window Frames Publication Type Journal Article LBNL Report Number LBNL-5099E Year of Publication 2011 Authors Gustavsen, Arlid, Steinar Grynning, Dariush K. Arasteh, Bjørn Petter Jelle, and Howdy Goudey Journal Energy and Buildings Volume 43 Issue 10 Pagination 2583-2594 Date Published 10/2011 Keywords Fenestration, heat transfer modeling, thermal performance, thermal transmittance, u-factor, window frames Abstract The thermal performance of windows is important for energy efficient buildings. Windows typically account for about 30-50 percent of the transmission losses though the building envelope, even if their area fraction of the envelope is far less. The reason for this can be found by comparing the thermal transmittance (U-factor) of windows to the U-factor of their opaque counterparts (wall, roof and floor constructions). In well insulated buildings the U-factor of walls, roofs an floors can be between 0.1-0.2 W/(m2K). The best windows have U-values of about 0.7-1.0. It is therefore obvious that the U-factor of windows needs to be reduced, even though looking at the whole energy balance for windows (i.e. solar gains minus transmission losses) makes the picture more complex.

415

Transforming Knowledge of Shrub Ecology and Management to Promote Integrated Vegetation Management on Power Line Corridors  

Science Conference Proceedings (OSTI)

Key to integrated vegetation management (IVM) is culturing desirable plant communities that minimize undesirable plants, typically trees. Shrubs are most commonly considered desirable plants. Over time, knowledge of shrubs and other aspects of management have been woven into the IVM approach. In summer 2002, EPRI formally began developing training materials as part of the U.S. Environmental Protection Agency's (EPA's) Pesticide Environmental Stewardship Program. The program has a societal goal of reducin...

2004-04-29T23:59:59.000Z

416

NIST DRAFT SP 800-130 April 2012 A Framework for ...  

Science Conference Proceedings (OSTI)

... If the CKMS is designed for international use, then it ... in the two domains to determine acceptability of the ... starting at some time in advance, or with ...

2013-04-25T23:59:59.000Z

417

Operational Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Operational Management Aviation Management Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory Committee Management Freedom of...

418

Aviation Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Aviation Management Aviation Management Aviation Management Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory Committee Management Freedom...

419

DOE Competency Management Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Competency Management Program DOE Competency Management Program DOE Competency Management Program The DOE faces a talent challenge derived from a number of factors including a dynamic operating environment, an anticipated wave of retirements from the workforce, and a projected shortage of workers with needed skills. The Office of the Chief Human Capital Officer (CHCO) is charged with leading the effort to address the talent challenge. The strategic identification, development and use of competencies are key enablers "for strategically aligning the agency's workforce to its missions through effective management of human capital policies and programs." Competency-centric Learning and Development facilitates the selection, development, training, and management of a highly skilled, productive, and diverse workforce.

420

Training Management Information System  

Science Conference Proceedings (OSTI)

The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

Rackley, M.P.

1989-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Categorical Exclusion Determinations: Environmental Management...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Management Categorical Exclusion Determinations: Environmental Management Categorical Exclusion Determinations issued by Environmental Management. DOCUMENTS AVAILABLE...

422

Comparative Analysis of US Metal Flow and Recycling for Key ...  

Science Conference Proceedings (OSTI)

Conference Tools for 2014 TMS Annual Meeting & Exhibition ... Symposium, Energy Technologies and Carbon Dioxide Management ... based on the existing life cycle studies are critically reviewed and compared: (a) ... J3: Corrosion Behavior of Differently Heat Treated Steels in CCS Environment with Supercritical CO2.

423

ORISE: Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Emergency Management Effective emergency management relies on thorough integration of preparedness plans at all levels of government. The Oak Ridge Institute for Science...

424

Comfort-aware home energy management under market-based demand-response  

Science Conference Proceedings (OSTI)

To regulate energy consumption and enable Demand-Response programs, effective demand-side management at home is key and an integral part of the future Smart Grid. In essence, the home energy management is a mix between discrete appliance scheduling problem ... Keywords: demand-response, energy management, smart grid

Jin Xiao, Jian Li, Raouf Boutaba, James Won-Ki Hong

2012-10-01T23:59:59.000Z

425

Federal Energy Management Program: Best Management Practice: Water  

NLE Websites -- All DOE Office Websites (Extended Search)

Water Management Planning to someone by E-mail Water Management Planning to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water Management Planning on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Water Management Planning on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Google Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Delicious Rank Federal Energy Management Program: Best Management Practice: Water Management Planning on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Water Management Planning on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

426

Federal Energy Management Program: Best Management Practice: Cooling Tower  

NLE Websites -- All DOE Office Websites (Extended Search)

Cooling Tower Management to someone by E-mail Cooling Tower Management to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Google Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Delicious Rank Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

427

MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT  

E-Print Network (OSTI)

#12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines

428

Estimating and understanding DOE waste management costs`  

SciTech Connect

This paper examines costs associated with cleaning up the US Department of Energy`s (DOE`s) nuclear facilities, with particular emphasis on the waste management program. Life-cycle waste management costs have been compiled and reported in the DOE Baseline Environmental Management Report (BEMR). Waste management costs are a critical issue for DOE because of the current budget constraints. The DOE sites are struggling to accomplish their environmental management objectives given funding scenarios that are well below anticipated waste management costs. Through the BEMR process, DOE has compiled complex-wide cleanup cost estimates and has begun analysis of these costs with respect to alternative waste management scenarios and policy strategies. From this analysis, DOE is attempting to identify the major cost drivers and prioritize environmental management activities to achieve maximum utilization of existing funding. This paper provides an overview of the methodology DOE has used to estimate and analyze some waste management costs, including the key data requirements and uncertainties.

Kang, J.S. [USDOE, Washington, DC (United States); Sherick, M.J. [Lockheed Idaho Technologies Co., Idaho Falls, ID (United States)

1995-12-01T23:59:59.000Z

429

Local structures - key to improved gas adsorption in carbon materials |  

NLE Websites -- All DOE Office Websites (Extended Search)

Functional Materials for Energy Functional Materials for Energy Local structures - key to improved gas adsorption in carbon materials September 23, 2013 (Inset, top left) A simulated disordered carbon structure. (Inset, bottom right) Same structure, with dense colored regions showing the strongest adsorption positions. (Main figure) Isosteric heat of adsorption as a function of carbon density, showing the strong change of adsorption with pore size. Combined results from electron microscopy, neutron scattering, and theory, illustrate the link between local structures and adsorption properties in carbon materials. The achieved understanding at the atomic scale is a crucial step towards predicting and designing materials with enhanced gas adsorption properties, with important implications for applications such as

430

Numerical analysis of decoy state quantum key distribution protocols  

SciTech Connect

Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

431

Stable polarization-encoded quantum key distribution in fiber  

E-Print Network (OSTI)

Polarizations of single-photon pulses have been controlled with long-term stability of more than 10 hours by using an active feedback technique for auto-compensation of unpredictable polarization scrambling in long-distance fiber. Experimental tests of long-term operations in 50, 75 and 100 km fibers demonstrated that such a single-photon polarization control supported stable polarization encoding in long-distance fibers to facilitate stable one-way fiber system for polarization-encoded quantum key distribution, providing quantum bit error rates below the absolute security threshold.

Wu, G; Li, Y; Zeng, H; Wu, Guang; Chen, Jie; Li, Yao; Zeng, Heping

2006-01-01T23:59:59.000Z

432

Renewable: A key component of our global energy future  

DOE Green Energy (OSTI)

Inclusion of renewable energy sources in national and international energy strategies is a key component of a viable global energy future. The global energy balance is going to shift radically in the near future brought about by significant increases in population in China and India, and increases in the energy intensity of developing countries. To better understand the consequences of such global shifts in energy requirements and to develop appropriate energy strategies to respond to these shifts, we need to look at the factors driving choices among supply options by geopolitical consumers and the impact these factors can have on the future energy mix.

Hartley, D.

1995-12-31T23:59:59.000Z

433

Key results from SB8 simulant flowsheet studies  

SciTech Connect

Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

Koopman, D. C.

2013-04-26T23:59:59.000Z

434

Environmental Management System Plan  

SciTech Connect

Executive Order 13423, Strengthening Federal Environmental, Energy, and Transportation Management establishes the policy that Federal agencies conduct their environmental, transportation, and energy-related activities in a manner that is environmentally, economically and fiscally sound, integrated, continually improving, efficient, and sustainable. The Department of Energy (DOE) has approved DOE Order 450.1A, Environmental Protection Program and DOE Order 430.2B, Departmental Energy, Renewable Energy and Transportation Management as the means of achieving the provisions of this Executive Order. DOE Order 450.1A mandates the development of Environmental Management Systems (EMS) to implement sustainable environmental stewardship practices that: (1) Protect the air, water, land, and other natural and cultural resources potentially impacted by facility operations; (2) Meet or exceed applicable environmental, public health, and resource protection laws and regulations; and (3) Implement cost-effective business practices. In addition, the DOE Order 450.1A mandates that the EMS must be integrated with a facility's Integrated Safety Management System (ISMS) established pursuant to DOE P 450.4, 'Safety Management System Policy'. DOE Order 430.2B mandates an energy management program that considers energy use and renewable energy, water, new and renovated buildings, and vehicle fleet activities. The Order incorporates the provisions of the Energy Policy Act of 2005 and Energy Independence and Security Act of 2007. The Order also includes the DOE's Transformational Energy Action Management initiative, which assures compliance is achieved through an Executable Plan that is prepared and updated annually by Lawrence Berkeley National Laboratory (LBNL, Berkeley Lab, or the Laboratory) and then approved by the DOE Berkeley Site Office. At the time of this revision to the EMS plan, the 'FY2009 LBNL Sustainability Executable Plan' represented the most current Executable Plan. These DOE Orders and associated policies establish goals and sustainable stewardship practices that are protective of environmental, natural, and cultural resources, and take a life cycle approach that considers aspects such as: (1) Acquisition and use of environmentally preferable products; (2) Electronics stewardship; (3) Energy conservation, energy efficiency, and renewable energy; (4) Pollution prevention, with emphasis on toxic and hazardous chemical and material reduction; (5) Procurement of efficient energy and water consuming materials and equipment; (6) Recycling and reuse; (7) Sustainable and high-performance building design; (8) Transportation and fleet management; and (9) Water conservation. LBNL's approach to sustainable environmental stewardship required under Order 450.1A poses the challenge of implementing its EMS in a compliance-based, performance-based, and cost-effective manner. In other words, the EMS must deliver real and tangible business value at a minimal cost. The purpose of this plan is to describe Berkeley Lab's approach for achieving such an EMS, including an overview of the roles and responsibilities of key Laboratory parties. This approach begins with a broad-based environmental policy consistent with that stated in Chapter 11 of the LBNL Health and Safety Manual (PUB-3000). This policy states that Berkeley Lab is committed to the following: (1) Complying with applicable environmental, public health, and resource conservation laws and regulations. (2) Preventing pollution, minimizing waste, and conserving natural resources. (3) Correcting environmental hazards and cleaning up existing environmental problems, and (4) Continually improving the Laboratory's environmental performance while maintaining operational capability and sustaining the overall mission of the Laboratory. A continual cycle of planning, implementing, evaluating, and improving processes will be performed to achieve goals, objectives, and targets that will help LBNL carry out this policy. Each year, environmental aspects will be identified and their impacts to the environm

Fox, Robert; Thorson, Patrick; Horst, Blair; Speros, John; Rothermich, Nancy; Hatayama, Howard

2009-03-24T23:59:59.000Z

435

Summary - Environmental Management Waste Management Facility...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ETR Report Date: February 2008 ETR-11 United States Department of Energy Office of Environmental Management (DOE-EM) External Technical Review of Environmental Management...

436

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Faucets and Showerheads to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Faucets and Showerheads on Facebook Tweet about Federal Energy...

437

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Other Water Intensive Processes to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Other Water Intensive Processes on Facebook Tweet about...

438

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Water-Efficient Landscaping to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water-Efficient Landscaping on Facebook Tweet about Federal...

439

ESNETPKI-007 Helm Muruganantham ESnet Hardware Security Module Evaluation September 2002 . Public Key Infrastructure ESnet Hardware Security Module Evaluation  

E-Print Network (OSTI)

This document discusses the technical details of Chrysalis, nCipher and Rainbow Hardware Security Module products. We conducted this investigation in order to identify a product or products we could use in our Certificate Authority project in support of DOE Office of Sciences computational grids. The investment DOE made in our project justified the time and expense of bringing this CA up to a higher standard of trustworthiness. We were able to identify some usable products and selected nCipher for our use, and this is described below. The experience we went through may be of benefit to others, and any discussion provoked by this report may be of benefit to us. 1.1 Scope of Problem The heart of the PKI is the Certificate Authority (CA). A certificate authority signs objects, such as subscribers' public keys; these objects are then trusted by relying parties. What that trust means is a matter left to the Certificate Policy (CP) document, and the relying parties themselves (and perhaps other agreements or statutory limitations). The CA Signing Key is used to sign all certificates that are issued by that particular CA, as well as certificate revocation lists (CRLs) and other objects. The very foundation of the PKI is based on the integrity of that root key. If the signing key is compromised, all certificates and CRLs within that specific CA service are suspect and the Certificate Authority's overall credibility is brought into serious question. In addition, ESnet needs to run some of the CA services "on line". Without going into the details of the iPlanet CMS software, the registration manager and the certificate manager are meant to be on-line services, available to customers, subscribers, registration authority agents, and administrators at all times. The servers that s...

September Overview The; Esnetpki- Helm

2002-01-01T23:59:59.000Z

440

DUF6 Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Depleted UF6 Management An introduction to DOE's Depleted UF6 Management Program. The mission of the DOE's Depleted UF6 Management Program is to safely and efficiently...

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Competitive advantage key to E and P success  

SciTech Connect

This paper discusses how the U.S. E and P industry needs to start fresh, with philosophies and management approaches more in tune with economic, geologic, and competitive realities. The new goal is to maximize shareholder value. The companies that will win, not just survive, in the 1990s are those that make strategic decisions about where to produce and explore, systematically challenge themselves to outperform their competitors, and organize to develop and leverage their unique or superior capabilities.

Steinhubl, A. (McKinsey and Co., Houston, TX (US))

1990-06-04T23:59:59.000Z

442

Key Distribution based on Three Player Quantum Games  

E-Print Network (OSTI)

We study a new QKD that is different from the scheme proposed by \\cite{Ramz2}, though it essentially takes our ground on three-player quantum games and Greenberg-Horne-Zeilinger triplet entangled state (GHZ state) \\cite{Gree} is used. In the scheme proposed in this paper, players in the game, Bob and Charlie (and Alice also) can get some common key or information (applied strategies and their payoffs in the game), when Alice informs Bob and Charlie about some results of the measurement made by her. Even if somebody else knows the public information, he/she can not get any key information. There is not any arbiter in our scheme, since existence of an arbiter increases the risk of wiretapping. Lastly we discuss robustness of the proposed QKD method for eavesdrop. We show that though maximally entangled case and non-entangled case essentially provide an equivalent way as QKD, the latter is not available in the case where there are some eavesdroppers. At the same time, we point put that the entanglement of the initial state is crucial when a partially entangled state is used.

Norihito Toyota

2010-10-09T23:59:59.000Z

443

Your Records Management Responsibilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Your Records Management Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your job. This pamphlet explains your responsibilities for federal records and provides the context for understanding records management in the federal government and in the Department of Energy. TOP RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT

444

Integrated Safety Management Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INTEGRATED SAFETY INTEGRATED SAFETY MANAGEMENT SYSTEM DESCRIPTION U.S. DEPARTMENT OF ENERGY Office of Environmental Management Headquarters May 2008 Preparation: Braj K. sin& Occupational Safety and Health Manager Office of Safety Management Concurrence: Chuan-Fu wu Director, Offlce of Safety Management Deputy Assistant Secretary for safe& Management andoperations Operations Officer for 1 Environmental Management Approval: Date p/-g Date Environmental Management TABLE OF CONTENTS ACRONYMS................................................................................................................................................................v EXECUTIVE SUMMARY .........................................................................................................................................1

445

Managing time, part 2  

Science Conference Proceedings (OSTI)

Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.

Peter J. Denning; Ritu Raj

2011-09-01T23:59:59.000Z

446

Environmental Management Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Management Systems Technical Assistance Tools Technical Assistance Tool: Integrating Sustainable Practices into Environmental Management Systems , November 2009...

447

Management Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation Plan Transportation Plan (and Planning) Development National Transportation Stakeholders Forum May 15, 2013 Buffalo, New York Considerations in Transportation Plan Development  Reaffirms the involvement of key stakeholders in both planning and carrying out transportation activities  Takes into account comments on the 2007 and 2009 plans, the WIPP Transportation Plan, the DOE Strategy in response to the BRC and NAS findings, the DOE Transportation Practices Manual (DOE Manual 460.2-1A) and commercial best practices  Outlines the planning process, involved parties, and schedules for activities that need to be completed prior to developing site-specific campaign plans  Reaches back to address issues (both resolved and unresolved) from

448

Environmental Management FY 2006 Budget Request DRAFT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation - Key to Transportation - Key to EM Success Presented to the Transportation External Coordination Working Group July 24, 2007 James Rispoli, Assistant Secretary Office of Environmental Management Solving Cleanup Challenges Through Risk Reduction 2 Solving Cleanup Challenges Through Risk Reduction ● EM's mission is the safe and successful cleanup of the Cold War legacy brought about from five decades of nuclear weapons development and government-sponsored nuclear energy research and includes:  Over 80 million gallons of radioactive liquid waste - the volume equivalent of 121 Olympic-size swimming pools  More than two thousand tons of spent nuclear fuel - roughly equal to the weight of 1,175 Toyota Camrys

449

Managing PCBs  

Science Conference Proceedings (OSTI)

Compliance with Environmental Protection Agency regulations for managing the polychlorinated biphenyls (PCBs) that were widely distributed in electrical equipment will be costly to the utility industry, estimated at over $5 billion over a ten-year period by the Electric Power Research Institute (EPRI). Most of the budget could be needed to identify and reclaim 2.5 million contaminated transformers. Three divisions are coordinating EPRI research efforts with those of other companies and utilities in the areas of detection, destruction, spill cleanup, disposal, and health effects. (DCK)

Lihach, N.

1981-10-01T23:59:59.000Z

450

Encryption Key Search using Java-based ALiCE Grid  

E-Print Network (OSTI)

Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

Virkar, Ameya

451

Key Response Planning Factors for the Aftermath of Nuclear Terrorism  

Science Conference Proceedings (OSTI)

Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

Buddemeier, B R; Dillon, M B

2009-01-21T23:59:59.000Z

452

LANL breaks ground on key sediment control project  

NLE Websites -- All DOE Office Websites (Extended Search)

Sediment control project Sediment control project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately $2 million features are up to eight feet high and made of rocks packed tightly into wire enclosures. November 5, 2009 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials.

453

Investing in Oil and Natural Gas A Few Key Issues  

U.S. Energy Information Administration (EIA) Indexed Site

Strategic Advisors in Global Energy Strategic Advisors in Global Energy Strategic Advisors in Global Energy Strategic Advisors in Global Energy Investing in Oil and Natural Gas: A Few Key Issues Prepared for EIA Conference Susan Farrell, Senior Director PFC Energy April 8, 2009 Investing in Oil and Gas| PFC Energy| Page 2 The Top 20 IOCs and Top 20 NOCs Account for Over Half of E&P Spend Source: PFC Energy, Global E&P Surveys Investing in Oil and Gas| PFC Energy| Page 3 Oil Prices Rose, But So Did Costs + 52% $0 $20 $40 $60 $80 $100 $120 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 WTI $/barrel Annual averages Large Gulf of Mexico Facility Costs by Segment Avg $28.31 Avg $59.13 Source: PFC Energy Investing in Oil and Gas| PFC Energy| Page 4 Near term Spending Cuts will be Significant

454

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 9, 2009 - 12:00am December 9, 2009 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Patricia A. Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, Department of Energy Mari Del Carmen Aponte, Ambassador to the Republic of El Salvador, Department of State Donald E. Booth, Ambassador to the Federal Democratic Republic of Ethiopia, Department of State Larry Persily, Federal Coordinator for Alaska Natural Gas Transportation Projects President Obama said, "The depth of experience these individuals bring to their roles will be valuable to my administration as we work to bring about real change for the American people. I look forward to working with them in

455

Nano Changes Have Macro Importance for a Key Electronics Material |  

NLE Websites -- All DOE Office Websites (Extended Search)

Squeezing an Old Material Could Yield "Instant-On" Memory Squeezing an Old Material Could Yield "Instant-On" Memory A Metal That Becomes Transparent under Pressure Under Pressure, Atoms Make Unlikely Alloys Slowing Down Near the Glass Transition New Light on Improving Engine Efficiencies Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed Nano Changes Have Macro Importance for a Key Electronics Material APRIL 23, 2009 Bookmark and Share Original image courtesy of http://www.freefoto.com By combining the results from several powerful techniques for studying materials structure at the nanoscale, including work at the U.S. Department of Energy's Advanced Photon Source (APS) at Argonne National Laboratory,

456

LANL to play key role in biofuel development  

NLE Websites -- All DOE Office Websites (Extended Search)

Biofuel development Biofuel development LANL to play key role in biofuel development LANL to create a proof-of-concept system for commercializing algae-based biofuels or other advanced biofuels that can be transported and sold using the nation's existing fueling infrastructure. January 14, 2010 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials.

457

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 10, 2010 - 12:00am December 10, 2010 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Peter B. Lyons, Assistant Secretary for Nuclear Energy, Department of Energy Denise E. O'Donnell, Director of the Bureau of Justice Assistance, Department of Justice Stephanie O'Sullivan, Principal Deputy Director of National Intelligence, Directorate of National Intelligence David Shear, Ambassador to the Socialist Republic of Vietnam, Department of State The President also announced his intent to appoint Harvey S. Wineberg as a Member of the President's Advisory Council on Financial Capability. His biography is below. President Obama said, "The American people will be greatly served by the

458

Potential Benefits from Improved Energy Efficiency of Key Electrical Products:  

NLE Websites -- All DOE Office Websites (Extended Search)

8254 8254 Potential Benefits from Improved Energy Efficiency of Key Electrical Products: The Case of India Michael McNeil, Maithili Iyer, Stephen Meyers, Virginie Letschert, James E. McMahon Environmental Energy Technologies Division Lawrence Berkeley National Laboratory University of California, Berkeley Berkeley, CA December 2005 This work was supported by the International Copper Association through the U.S. Department of Energy under Contract No. DE-AC03-76SF00098. 2 ABSTRACT The goal of this project was to estimate the net benefits that cost-effective improvements in energy efficiency can bring to developing countries. The study focused on four major electrical products in the world's second largest developing country, India. These

459

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 8, 2009 - 12:00am July 8, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Joe Garcia, Director of the Office of Minority Economic Impact, Department of Energy Michael H. Posner, Assistant Secretary of State for Democracy, Human Rights, and Labor, Department of State Stephen J. Rapp, Ambassador at Large for War Crimes Issues, Department of State Alexander G. Garza, Assistant Secretary for Health Affairs and Chief Medical Officer, Department of Homeland Security Susan L. Kurland, Assistant Secretary for Aviation and International Affairs, Department of Transportation Kenneth A. Spearman, Member of the Board of Directors, Farm Credit Administration Rolena Adorno, Member of the National Council on the Humanities

460

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, 2009 - 12:00am 4, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Daniel B. Poneman, Deputy Secretary, Department of Energy; Fred P. Hochberg, President and Chairman of the Export-Import Bank of the United States; Francisco "Frank" J. Sánchez, Under Secretary for International Trade, Department of Commerce; Miriam E. Sapiro, Deputy Trade Representative; Judith A. McHale, Under Secretary for Public Diplomacy and Public Affairs, Department of State; Philip J. "P.J." Crowley, Assistant Secretary of State for Public Affairs, Department of State; Bonnie D. Jenkins, Coordinator for Threat Reduction Programs (with the Rank of Ambassador), Department of

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

A Key Target for Diabetes Drugs | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Molten Metal Solidifies into a New Kind of Glass Molten Metal Solidifies into a New Kind of Glass Organic Polymers Show Sunny Potential A New Family of Quasicrystals Cool Muscles: Storing Elastic Energy for Flight A Further Understanding of Superconductivity Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor, which could help scientists design new drugs for type 2 diabetes. (Image courtesy of Katya Kadyshevskaya, The Scripps Research Institute) The three-dimensional (3-D) atomic structure of the human glucagon receptor has been identified by an international team of researchers carrying out

462

Key parameters influencing the performance of photocatalytic oxidation  

NLE Websites -- All DOE Office Websites (Extended Search)

Key parameters influencing the performance of photocatalytic oxidation Key parameters influencing the performance of photocatalytic oxidation (PCO) air purification under realistic indoor conditions Title Key parameters influencing the performance of photocatalytic oxidation (PCO) air purification under realistic indoor conditions Publication Type Journal Article Year of Publication 2012 Authors Destaillats, Hugo, Mohamad Sleiman, Douglas P. Sullivan, Catherine Jacquiod, Jean Sablayrolles, and Laurent Molins Journal Applied Catalysis B: Environmental Volume 128 Pagination 159-170 Date Published 11/30/2012 Abstract Photocatalytic oxidation (PCO) air cleaning is a promising technology suitable for the elimination of a broad range of volatile organic compounds (VOCs). However, performance of poorly designed PCO systems may be affected by the formation of volatile aldehydes and other partially oxidized byproducts. This study explored the role of key design and dimensioning parameters that influence the effective removal of primary pollutants and can help reduce or eliminate the formation of secondary byproducts. A model pollutant mixture containing benzene, toluene, o-xylene, undecane, 1-butanol, formaldehyde and acetaldehyde was introduced at a constant rate in a 20-m3 environmental chamber operating at an air exchange rate of 1 h-1. Individual pollutant concentrations were kept at realistically low levels, between 2 and 40 μg m-3. A prototype air cleaner provided with flat or pleated PCO filtering media was operated in an external ductwork loop that recirculated chamber air at flow rates in the range 178-878 m3 h-1, corresponding to recycle ratios between 8.5 and 38. Air samples were collected upstream and downstream of the air cleaner and analyzed off-line to determine single-pass removal efficiency. The final-to-initial chamber concentration ratio was used to determine the global chamber removal efficiency for each pollutant. In the flat filter configuration, longer dwelling times of compounds on the TiO2 surface were attained by reducing the recirculation airflow by a factor of ∼5, leading to increasing total pollutant removal efficiency from 5% to 44%. Net acetaldehyde and formaldehyde removal was achieved, the later at airflow rates below 300 m3 h-1, illustrating the critical importance of controlling the contact time of primary and secondary pollutants with the TiO2 surface. The use of pleated media was shown to increase significantly the system performance by extending the dwelling time of pollutants on the irradiated surface of the PCO media, with a 70% degradation of target pollutants. With the pleated media, formaldehyde removal efficiency increased to 60%. Irradiation using either a UVC or a UVA lamp under identical flow conditions produced similar pollutant elimination. A simple correlation between the steady-state single pass removal efficiency and the global chamber removal efficiency was used to rationalize these experimental results and identify optimal operating conditions.

463

City of Key West, Florida (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Florida (Utility Company) Florida (Utility Company) Jump to: navigation, search Name Key West City of Place Florida Utility Id 10226 Utility Location Yes Ownership M NERC Location FRCC NERC FRCC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Distribution Yes Alt Fuel Vehicle Yes Alt Fuel Vehicle2 Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Governmental Recreational Facility Lighting (Schedule S-3) LED High Watt, Approx. 72 Watt (Street Light Schedule S-1) Lighting LED High Watt, Approx. 72 Watts (Area Lighting Schedule S-2) Lighting

464

A verifiable random function with short proofs and keys  

E-Print Network (OSTI)

Abstract. We give a simple and efficient construction of a verifiable random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [14, 15], it avoids using an inefficient Goldreich-Levin transformation, thereby saving several factors in security. Our proofs of security are based on a decisional bilinear Diffie-Hellman inversion assumption, which seems reasonable given current state of knowledge. For small message spaces, our VRFs proofs and keys have constant size. By utilizing a collision-resistant hash function, our VRF can also be used with arbitrary message spaces. We show that our scheme can be instantiated with an elliptic group of very reasonable size. Furthermore, it can be made distributed and proactive. 1

Yevgeniy Dodis; R Yampolskiy

2005-01-01T23:59:59.000Z

465

M E Environmental Management Environmental Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

safety  performance  cleanup  closure safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management Office of Site Restoration, EM-10 Office of D&D and Facility Engineering, EM-13 Facility Deactivation & Decommissioning (D&D) D&D Program Map Addendum: Impact of American Recovery and Reinvestment Act (ARRA) on EM's D&D Program 2013 Edition U.S. Department Of Energy safety  performance  cleanup  closure M E Environmental Management Environmental Management safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management 3/13/2013 The American Recovery and Reinvestment Act of 2009

466

Integration of project management and systems engineering: Tools for a total-cycle environmental management system  

SciTech Connect

An expedited environmental management process has been developed at the Idaho National Engineering and Environmental Laboratory (INEEL). This process is one result of the Lockheed Martin commitment to the US Department of Energy to incorporate proven systems engineering practices with project management and program controls practices at the INEEL. Lockheed Martin uses a graded approach of its management, operations, and systems activities to tailor the level of control to the needs of the individual projects. The Lockheed Martin definition of systems engineering is: ``Systems Engineering is a proven discipline that defines and manages program requirements, controls risk, ensures program efficiency, supports informed decision making, and verifies that products and services meet customer needs.`` This paper discusses: the need for an expedited environmental management process; how the system was developed; what the system is; what the system does; and an overview of key components of the process.

Blacker, P.B.; Winston, R.

1997-10-01T23:59:59.000Z

467

Office of Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security and Emergency Management Office of Security and Emergency Management The Security and Emergency Management page is designed to give newcomers and veterans alike an introduction and refresher about our activities. We hope you will find it useful. Much of this page's contents are oriented to reindustrialization and other managers of new DOE projects and programs. Feel free to contact the designated key personnel for assistance. Access Authorization Branch Using established guidelines and the "whole person concept," we evaluate and adjudicate informaton about those who need clearances which is developed during background investigations. The objective is to render access determinations that are in the best interest of national security. We also provide security education and awareness information, personnel security program support, and visitor control and foreign travel support to the Oak Ridge Office, the Paducah-Portsmouth Project Office, and the Thomas Jefferson National Accerelator Facility.

468

Federal Energy Management Program: Recovery Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Recovery Act Recovery Act The American Recovery and Reinvestment Act of 2009 included funding for the Federal Energy Management Program (FEMP) to facilitate the Federal Government's implementation of sound, cost-effective energy management and investment practices to enhance the nation's energy security and environmental stewardship. FEMP completed nearly 120 technical assistance projects through this effort. FEMP national laboratory teams and contractor service providers visited more than 80 Federal sites located throughout the U.S. The site visits were a key component of FEMP Recovery Act funded technical assistance activity, which provided more than $13.2 million in funding for direct technical assistance to energy managers across the Federal Government. This service helped agencies accelerate their Recovery Act projects and make internal management decisions for investment in energy efficiency and deployment of renewable energy.

469

A Progressive Network Management Architecture Enabled By Java Technology  

E-Print Network (OSTI)

This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks.

Gavalas, Damianos; Ghanbari, Mohammed; O'Mahony, Mike

2010-01-01T23:59:59.000Z

470

ASGrid: autonomic management of hybrid sensor grid systems and applications  

Science Conference Proceedings (OSTI)

In this paper, we propose an autonomic management framework (ASGrid) to address the requirements of emerging large-scale applications in hybrid grid and sensor network systems. To the best of our knowledge, we are the first who proposed the ... Keywords: P2P, WSNs, autonomic computing, autonomic management, autonomic sensor grid, data aggregation, grid computing, hybrid distributed systems, key management, network security, peer computing, peer-to-, self-configuration, self-optimisation, self-protection, task scheduling, trust management, wireless sensor networks

Xiaolin Li; Xinxin Liu; Han Zhao; Huanyu Zhao; Nanyan Jiang; Manish Parashar

2009-11-01T23:59:59.000Z

471

Migration strategies roles for data management in CIM  

SciTech Connect

This paper describes the migration path a company goes through as it moves up the data management learning curve. This migration path is based on four distinct roles for data management in CIM. The first two sections review the justification for CIM and data management. The first section describes the changing competitive environment manufacturers face and how CIM addresses the problems this situation creates. The second section identifies the two key characteristics of a database management system and the benefits provided. The third section identifies and discusses the four roles for data management in CIM. These four roles and their variations provide snapshots of where a company is on the data management learning curve. The fourth section describes the migration path a company goes through as it moves up the learning curve. Although there are similarities, there are some significant differences between this learning curve and the one experienced by MIS as it adopted data management technology. 3 refs.

Bray, O.H.

1989-01-01T23:59:59.000Z

472

Definition: Meter Data Management System | Open Energy Information  

Open Energy Info (EERE)

System System Jump to: navigation, search Dictionary.png Meter Data Management System A meter data management system (MDMS) collects and stores meter data from a head-end system and processes that meter data into information that can be used by other utility applications including billing, customer information systems, and outage management systems. The MDMS is a key resource for managing large quantities of meter data.[1] Related Terms system, outage management system References ↑ https://www.smartgrid.gov/category/technology/meter_data_management_system [[Ca LikeLike UnlikeLike You like this.Sign Up to see what your friends like. tegory: Smart Grid Definitionssmart grid,smart grid, |Template:BASEPAGENAME]]smart grid,smart grid, Retrieved from "http://en.openei.org/w/index.php?title=Definition:Meter_Data_Management_System&oldid=50258

473

Industrial Energy Efficiency as a Risk Management Strategy  

E-Print Network (OSTI)

Industry utilizes risk management as a tool in efforts to maximize the bottom line. Industry embraced risk management strategies in the 1960s and since then it has become a key component of a comprehensive business strategy. Peter Fusaro, author of Energy Risk Management explains, The risk management process reduces financial exposure associated with price volatility by substituting a transaction made now for one that would be made at a later date. Risk management aids companies in minimizing operational surprises or losses. In recent decades, energy has become a greater risk to profitability due to the volatility that exists in the oil and natural gas markets. Therefore, companies now consider energy as an element of their risk management portfolio. Traditional strategies to combat against unwanted exposure in this market include hedging and long term and futures contracts. However, the following explores the topic of considering energy efficiency as a risk management tool in reducing exposure to the volatility of the energy market.

Naumoff, C.; Shipley, A. M.

2007-01-01T23:59:59.000Z

474

Population Status and Evaluation of Landscape Change for the Lower Keys Marsh Rabbit  

E-Print Network (OSTI)

Wildlife biologists and land managers tasked with the recovery of the endangered Lower Keys marsh rabbit (LKMR; Sylvilagus palustris hefneri) were in need of a current population estimate as well as a method to estimate the LKMR population annually. Habitat loss and fragmentation from population growth and development have threatened the existence of the LKMR. Establishing and understanding long-term habitat availability for the LKMR is important for determining causes of historical population declines as well as designing and implementing successful recovery plans. I conducted a range-wide pellet survey and a mark-recapture study to estimate the LKMR population. I evaluated the fit of 5 models and considered the variation in behavioral response model the best model. I correlated (r2 = 0.913) this model's rabbit abundance estimates to pellet density in 11 patches and generated a range-wide population estimate of 317, a western clade population of 257, an eastern clade population of 25, and translocated LKMR populations of 35 and 0 on Little Pine and Water keys, respectively. This prediction equation provides managers a quick, efficient, and non-invasive method to estimate LKMR abundance from pellet counts. To quantify the amount of habitat loss and fragmentation that occurred over the last 50 years, I systematically delineated and compared potential LKMR habitat using 1959 and 2006 aerial photographs. Additionally, I investigated if other factors could have reduced the amount of suitable habitat available for the LKMR with a comparison of habitat loss and fragmentation on a developed island and an undeveloped island. Range-wide, I found that number of habitat patches increased by 38, total class area decreased by 49.0%, and mean patch size decreased by 44.3%. Mean shape index increased by 4.2% and mean proximity index decreased by 13%. Both the 1959 and 2006 connectance indices were low while the 2006 set decreased 12.1%. I observed the same patterns of habitat loss and fragmentation on both the developed and undeveloped islands as I did in the range-wide landscape analysis. I found that LKMR habitat has declined in area and become more fragmented over the last 50 years. Habitat loss and fragmentation by development have directly endangered the LKMR; however, sea level rise and woody encroachment also could have historically caused habitat loss and fragmentation. Although development in LKMR habitat was halted, sea-level rise and woody encroachment could continue to alter LKMR habitat.

Schmidt, Jason Alan

2009-12-01T23:59:59.000Z

475

Recommended Practice for Patch Management of Control Systems  

Science Conference Proceedings (OSTI)

A key component in protecting a nations critical infrastructure and key resources is the security of control systems. The term industrial control system refers to supervisory control and data acquisition, process control, distributed control, and any other systems that control, monitor, and manage the nations critical infrastructure. Critical Infrastructure and Key Resources (CIKR) consists of electric power generators, transmission systems, transportation systems, dam and water systems, communication systems, chemical and petroleum systems, and other critical systems that cannot tolerate sudden interruptions in service. Simply stated, a control system gathers information and then performs a function based on its established parameters and the information it receives. The patch management of industrial control systems software used in CIKR is inconsistent at best and nonexistent at worst. Patches are important to resolve security vulnerabilities and functional issues. This report recommends patch management practices for consideration and deployment by industrial control systems owners.

Steven Tom; Dale Christiansen; Dan Berrett

2008-12-01T23:59:59.000Z

476

Integrated Substation Equipment Risk and Performance Assessment Tool for Asset Management and Smart Grid Implementation  

Science Conference Proceedings (OSTI)

Risk assessment and risk management are key elements in any well-developed asset management plan, and an increasing number of utility managers are devoting resources to improving their ability to understand and make risk-based decisions. Consequently, there is growing interest in the tools and methodologies required to better assess equipment performance and risk and provide quantitative information to drive asset management decision processes. In addition, risk and performance assessment tools can be in...

2009-12-23T23:59:59.000Z

477

EERE: Federal Energy Management Program Home Page  

NLE Websites -- All DOE Office Websites (Extended Search)

The U.S. Department of Energy's Federal Energy Management Program (FEMP) works with key individuals to accomplish energy change within organizations, by bringing expertise from all levels of project and policy implementation, to enable Federal agencies to meet energy-related goals and to provide energy leadership to the country. The U.S. Department of Energy's Federal Energy Management Program (FEMP) works with key individuals to accomplish energy change within organizations, by bringing expertise from all levels of project and policy implementation, to enable Federal agencies to meet energy-related goals and to provide energy leadership to the country. FEMP SERVICE AREAS Image of the capitol building. Laws, Regulations, & Reporting Meet Energy Goals and Regulatory Requirements Image of a building. Sustainable Buildings & Campuses Design, Operate, and Maintain High-Performance Buildings Image of a solar panel. Project Funding Funding and Contract Assistance for Energy Projects Image of a lightbulb. Procuring Energy-Efficient Products Specify and Purchase Efficient Products

478

Overview - Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Help > Data Management Help > Data Management Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Overview Welcome to the data management pages for data providers to the ORNL Distributed Active Archive (DAAC). These pages provide an overview of data management planning and preparation and offer practical methods to successfully share and archive your data. Plan - write a short data management plan while preparing your research proposal, Manage - assign logical, descriptive file names, define the contents of your data files, and use consistent data values when preparing

479

Multi-client quantum key distribution using wavelength division multiplexing  

Science Conference Proceedings (OSTI)

Quantum Key Distribution (QKD) exploits the rules of quantum mechanics to generate and securely distribute a random sequence of bits to two spatially separated clients. Typically a QKD system can support only a single pair of clients at a time, and so a separate quantum link is required for every pair of users. We overcome this limitation with the design and characterization of a multi-client entangled-photon QKD system with the capacity for up to 100 clients simultaneously. The time-bin entangled QKD system includes a broadband down-conversion source with two unique features that enable the multi-user capability. First, the photons are emitted across a very large portion of the telecom spectrum. Second, and more importantly, the photons are strongly correlated in their energy degree of freedom. Using standard wavelength division multiplexing (WDM) hardware, the photons can be routed to different parties on a quantum communication network, while the strong spectral correlations ensure that each client is linked only to the client receiving the conjugate wavelength. In this way, a single down-conversion source can support dozens of channels simultaneously--and to the extent that the WDM hardware can send different spectral channels to different clients, the system can support multiple client pairings. We will describe the design and characterization of the down-conversion source, as well as the client stations, which must be tunable across the emission spectrum.

Grice, Warren P [ORNL; Bennink, Ryan S [ORNL; Earl, Dennis Duncan [ORNL; Evans, Philip G [ORNL; Humble, Travis S [ORNL; Pooser, Raphael C [ORNL; Schaake, Jason [ORNL; Williams, Brian P [ORNL

2011-01-01T23:59:59.000Z

480

Do myoepithelial cells hold the key for breast tumorprogression?  

SciTech Connect

Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

Polyak, Kornelia; Hu, Min

2005-11-18T23:59:59.000Z

Note: This page contains sample records for the topic "key management ckms" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Do myoepithelial cells hold the key for breast tumorprogression?  

SciTech Connect

Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

Polyak, Kornelia; Hu, Min

2005-11-18T23:59:59.000Z

482

Feasibility of 300 km Quantum Key Distribution with Entangled States  

E-Print Network (OSTI)

A significant limitation of practical quantum key distribution (QKD) setups is currently their limited operational range. It has recently been emphasized (X. Ma, C.-H. F. Fung, and H.-K. Lo., Phys. Rev. A, 76:012307, 2007) that entanglement-based QKD systems can tolerate higher channel losses than systems based on weak coherent laser pulses (WCP), in particular when the source is located symmetrically between the two communicating parties, Alice and Bob. In the work presented here, we experimentally study this important advantage by implementing different entanglement-based QKD setups on a 144~km free-space link between the two Canary Islands of La Palma and Tenerife. We established three different configurations where the entangled photon source was placed at Alice's location, asymmetrically between Alice and Bob and symmetrically in the middle between Alice and Bob, respectively. The resulting quantum channel attenuations of 35~dB, 58~dB and 71~dB, respectively, significantly exceed the limit for WCP systems. This confirms that QKD over distances of 300~km and even more is feasible with entangled state sources placed in the middle between Alice and Bob.

Thomas Scheidl; Rupert Ursin; Alessandro Fedrizzi; Sven Ramelow; Xiao-Song Ma; Thomas Herbst; Robert Prevedel; Lothar Ratschbacher; Johannes Kofler; Thomas Jennewein; Anton Zeilinger

2010-07-27T23:59:59.000Z

483

Data Management Architectures  

Science Conference Proceedings (OSTI)

Data management is the organization of information to support efficient access and analysis. For data intensive computing applications, the speed at which relevant data can be accessed is a limiting factor in terms of the size and complexity of computation that can be performed. Data access speed is impacted by the size of the relevant subset of the data, the complexity of the query used to define it, and the layout of the data relative to the query. As the underlying data sets become increasingly complex, the questions asked of it become more involved as well. For example, geospatial data associated with a city is no longer limited to the map data representing its streets, but now also includes layers identifying utility lines, key points, locations and types of businesses within the city limits, tax information for each land parcel, satellite imagery, and possibly even street-level views. As a result, queries have gone from simple questions, such as "how long is Main Street?", to much more complex questions such as "taking all other factors into consideration, are the property values of houses near parks higher than those under power lines, and if so, by what percentage". Answering these questions requires a coherent infrastructure, integrating the relevant data into a format optimized for the questions being asked.

Critchlow, Terence J.; Abdulla, Ghaleb; Becla, Jacek; Kleese van Dam, Kerstin; Lang, Sam; McGuinness, Deborah L.

2012-10-31T23:59:59.000Z

484

Supplier relationship management best practices applied to the manufacture of a helicopter airframe in China  

E-Print Network (OSTI)

Sikorsky's recently begun program to manufacture the S-76 helicopter airframe at a supplier in China is examined as a case study of supplier relationship management. Best practices and key principles from the literature ...

King, R. Jon (Ralph Jon)

2009-01-01T23:59:59.000Z

485

An exploration of supply chain management practices in the aerospace industry and in Rolls-Royce  

E-Print Network (OSTI)

This thesis is a part of the Supply Chain 2020 research project which seeks to study best practices in supply chain management in multiple industries in order to develop a deeper understanding of key principles and practices ...

Tiwari, Mohit

2005-01-01T23:59:59.000Z

486

Reducing data center energy consumption via coordinated cooling and load management  

Science Conference Proceedings (OSTI)

This paper presents a unified approach to data center energy management based on a modeling framework that characterizes the influence of key decision variables on computational performance, thermal generation, and power consumption. Temperature dynamics ...

Luca Parolini; Bruno Sinopoli; Bruce H. Krogh

2008-12-01T23:59:59.000Z

487

Reverse supply chain forecasting and decision modeling for improved inventory management  

E-Print Network (OSTI)

This thesis details research performed during a six-month engagement with Verizon Wireless (VzW) in the latter half of 2012. The key outcomes are a forecasting model and decision-support framework to improve management of ...

Petersen, Brian J. (Brian Jude)

2013-01-01T23:59:59.000Z

488

Office of Legacy Management FY 2009 Energy Management Data Report...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Administration Other Agencies You are here Home Office of Legacy Management FY 2009 Energy Management Data Report Office of Legacy Management FY 2009 Energy Management Data...

489

Managing long term communications: Conversation and contact management. to appear HICCS 2002, Managing long term communications: Conversation and contact  

E-Print Network (OSTI)

Contact management is an important part of everyday work. People exchange business cards to try to enter each others contact lists. Local businesses provide refrigerator magnets and calendars so they will be called on when a particular need arises. People who use the telephone extensively are selective about who they add to their speed dial lists. Contact management and conversation management are linked. Many busy professionals discourage voice calls and messages, because email enables them to better manage their time, conversations, and contacts. People also spend large amounts of time transcribing voicemail, browsing email archives and writing todo lists all of these activities are intended to help track the content and status of outstanding conversations. Together, these practices reveal some of the complexities of contact and conversation management. We investigated contact and conversation management by carrying out twenty semi-structured interviews with professionals in assorted fields. Key properties of technologically-mediated conversations identified were: (1) they are extended in time, which means (2) people typically engage in multiple concurrent conversations, and (3) conversations often involve multiple participants. These properties led to a significant memory load for our informants: they spoke of the difficulty of keeping tracking of conversational content and status, as well as the identity, contact information, and expertise of their conversational partners. People respond to these problems by trying to make key aspects of their conversations persistent; however, with current support tools, this strategy meets with mixed success. Building on the findings of our study, we present a new support tool that aids in managing contacts and conversation status.

Steve Whittaker; Quentin Jones; Loren Terveen

2002-01-01T23:59:59.000Z

490

ICT Supply Chain Risk Management  

Science Conference Proceedings (OSTI)

... ICT Supply Chain Risk Management Manager's Forum ... ICT Supply Chain Risk Management National Institute of Standards and Technology Page 6. ...

2013-06-04T23:59:59.000Z

491

Run manager module for CORAL laboratory management  

E-Print Network (OSTI)

This thesis describes a new module, the Run Manager (RM), for Stanford Nanofabrication Facility's Common Object Representation for Advanced Laboratories (CORAL). CORAL is the lab manager with which MIT's Microsystems ...

Klann, Jeffrey G

2004-01-01T23:59:59.000Z

492

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Single-Pass Cooling Equipment to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Single-Pass Cooling Equipment on Facebook Tweet about Federal...

493

Environmental Management System Plan  

E-Print Network (OSTI)

3) environmental management programs, (4) training, (5)Management Programs3-5 Structure and Responsibility.3-6 Training,Management System Plan Program Elements Additional information regarding EMS training

Fox, Robert

2009-01-01T23:59:59.000Z

494

Provably-Secure two-round password-authenticated group key exchange in the standard model  

Science Conference Proceedings (OSTI)

Password-authenticated group key exchange (PAGKE) allows group users to share a session key using a human-memorable password only. The fundamental security goal of PAGKE is security against dictionary attacks. Several solutions have been proposed ...

Jeong Ok Kwon; Ik Rae Jeong; Dong Hoon Lee

2006-10-01T23:59:59.000Z

495

NERSC Global Filesystem Played a Key Role in Discovery of the...  

NLE Websites -- All DOE Office Websites (Extended Search)

NGFS Played a Key Role in Neutrino Finding NERSC Global Filesystem Played a Key Role in Discovery of the Last Neutrino Mixing Angle February 7, 2013 | Tags: High Energy Physics...

496

High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors  

E-Print Network (OSTI)

We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

Spellmeyer, Neal W.

497

A hybrid data structure for dense keys in in-memory database systems  

E-Print Network (OSTI)

This thesis presents a data structure which performs well for in-memory indexing of keys that are unevenly distributed into clusters with a high density of keys. This pattern is prevalent, for example, in systems that use ...

Muiz Navarro, Jos Alberto

2010-01-01T23:59:59.000Z

498

Direct and Reverse Secret-Key Capacities of a Quantum Channel  

E-Print Network (OSTI)

We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

Braunstein, Samuel L.

499

Federal Energy Management Program: Operations and Maintenance Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Support to someone by E-mail Management Support to someone by E-mail Share Federal Energy Management Program: Operations and Maintenance Management Support on Facebook Tweet about Federal Energy Management Program: Operations and Maintenance Management Support on Twitter Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Google Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Delicious Rank Federal Energy Management Program: Operations and Maintenance Management Support on Digg Find More places to share Federal Energy Management Program: Operations and Maintenance Management Support on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

500

Energy Star Portfolio Manager  

NLE Websites -- All DOE Office Websites (Extended Search)

May 2013 What's New in Portfolio Manager ? EPA's ENERGY STAR Portfolio Manager tool helps you measure and track energy use, water use, and greenhouse gas emissions of your...