Powered by Deep Web Technologies
Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On...

2

ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR  

SciTech Connect (OSTI)

Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data transmission in place of NSA Type 1 devices.

Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

2011-08-03T23:59:59.000Z

3

Integrity, Reliability and Security: The Role of Technology  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

F. Lawson F. Lawson Director, Strategic Center for Natural Gas & Oil National Energy Technology Laboratory General session Natural Gas Technologies Conference 2005 Cosponsors: NETL/Gas Technology Institute Orlando, Florida January 31, 2005 Integrity, Reliability and Security: The Role of Technology Introduction Integrity, reliability, and security encompass all the attributes we want-indeed, need-from our natural gas industry. We need integrity in physical transportation and storage systems, reliability in operating systems, and security in supplies and delivery systems. This conference is the most comprehensive forum for addressing new and evolving technologies impacting all these needs. The conference scope runs the gamut: from finding and producing to storing,

4

Reliable and Adaptable Security Engineering for Database-Web Services  

E-Print Network [OSTI]

Reliable and Adaptable Security Engineering for Database-Web Services Martin Wimmer , Daniela,ehrnlech}@db.fmi.uni-passau.de Abstract. The situation in engineering security for Web services that access databases is as follows of sophisticated access control concepts for e-services. When engineering Web services that depend on databases

Kemper, Alfons

5

Cyber Security Vulnerability Impact on I&C Reliability  

SciTech Connect (OSTI)

We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities.

Hadley, Mark D.; McBride, Justin B.

2006-11-01T23:59:59.000Z

6

Microgrids and Heterogeneous Security, Quality, Reliability, and Availability  

E-Print Network [OSTI]

and Energy Reliability, Distribution System Integrationand Energy Reliability, Distribution System Integration

Marnay, Chris

2007-01-01T23:59:59.000Z

7

o secure a safe, reliable and low-carbon energy future, we must alter  

E-Print Network [OSTI]

and human behav- iour1 . The US Department of Energy notes2 that supply and demand is "affected as much collect qualitative data about energy consumption. Similar problems are apparent in Europe4 . My analysisT o secure a safe, reliable and low- carbon energy future, we must alter both technologies

Kammen, Daniel M.

8

New Article on Cybersecurity Discusses DOEs Partnership with the Energy Sector to Keep the Grid Reliable and Secure  

Broader source: Energy.gov [DOE]

An article by OEs Carol Hawk and Akhlesh Kaushiva in The Electricity Journal discusses cybersecurity for the power grid and how DOE and the energy sector are partnering to keep the smart grid reliable and secure.

9

Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks  

E-Print Network [OSTI]

Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks CIGDEM the energy-latency-reliability trade-off for broadcast in WSNs by presenting a new protocol called PBBF. Essentially, for a given reliability level, energy and latency are found to be inversely related and our study

Paris-Sud XI, Université de

10

Nuclear Weapons Latency  

E-Print Network [OSTI]

......................................................................... 14 Fig. 4. Conceptual flow of Latency tool Petri Net simulation. ........................................ 18 Fig. 5. Overall flow of Latency Tool. .............................................................................. 19 Fig. 6. Latency... density function bound simulations. .............. 43 xi Fig. 14. The expansion of one transition into a series of transitions. A simple Petri net with (a) 1 transition T1, (b) T1 replaced by two transitions in series, T1a and T1b, both half...

Sweeney, David J

2014-07-25T23:59:59.000Z

11

Electric Power Infrastructure Reliability and Security (EPIRS) Reseach and Development Initiative  

SciTech Connect (OSTI)

Power systems have become increasingly complex and face unprecedented challenges posed by population growth, climate change, national security issues, foreign energy dependence and an aging power infrastructure. Increased demand combined with increased economic and environmental constraints is forcing state, regional and national power grids to expand supply without the large safety and stability margins in generation and transmission capacity that have been the rule in the past. Deregulation, distributed generation, natural and man-made catastrophes and other causes serve to further challenge and complicate management of the electric power grid. To meet the challenges of the 21st century while also maintaining system reliability, the electric power grid must effectively integrate new and advanced technologies both in the actual equipment for energy conversion, transfer and use, and in the command, control, and communication systems by which effective and efficient operation of the system is orchestrated - in essence, the 'smart grid'. This evolution calls for advances in development, integration, analysis, and deployment approaches that ultimately seek to take into account, every step of the way, the dynamic behavior of the system, capturing critical effects due to interdependencies and interaction. This approach is necessary to better mitigate the risk of blackouts and other disruptions and to improve the flexibility and capacity of the grid. Building on prior Navy and Department of Energy investments in infrastructure and resources for electric power systems research, testing, modeling, and simulation at the Florida State University (FSU) Center for Advanced Power Systems (CAPS), this project has continued an initiative aimed at assuring reliable and secure grid operation through a more complete understanding and characterization of some of the key technologies that will be important in a modern electric system, while also fulfilling an education and outreach mission to provide future energy workforce talent and support the electric system stakeholder community. Building upon and extending portions of that research effort, this project has been focused in the following areas: (1) Building high-fidelity integrated power and controls hardware-in-the-loop research and development testbed capabilities (Figure 1). (2) Distributed Energy Resources Integration - (a) Testing Requirements and Methods for Fault Current Limiters, (b) Contributions to the Development of IEEE 1547.7, (c) Analysis of a STATCOM Application for Wind Resource Integration, (d) Development of a Grid-Interactive Inverter with Energy Storage Elements, (e) Simulation-Assisted Advancement of Microgrid Understanding and Applications; (3) Availability of High-Fidelity Dynamic Simulation Tools for Grid Disturbance Investigations; (4) HTS Material Characterization - (a) AC Loss Studies on High Temperature Superconductors, (b) Local Identification of Current-Limiting Mechanisms in Coated Conductors; (5) Cryogenic Dielectric Research; and (6) Workshops, education, and outreach.

Rick Meeker; L. Baldwin; Steinar Dale; Alexander Domijan; Davild Larbalestier; Hui Li; Peter McLaren; Sastry Pamidi; Horatio Rodrigo; Michael Steurer

2010-03-31T23:59:59.000Z

12

GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code  

E-Print Network [OSTI]

to reject the submission of widgets that do not meet the site's security policies. To show the practicality

Livshits, Ben

13

Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program  

SciTech Connect (OSTI)

The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

2009-10-19T23:59:59.000Z

14

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

15

Reliability of Calderbank-Shor-Steane Codes and Security of Quantum Key Distribution  

E-Print Network [OSTI]

After Mayers (1996, 2001) gave a proof of the security of the Bennett-Brassard 1984 (BB84) quantum key distribution protocol, Shor and Preskill (2000) made a remarkable observation that a Calderbank-Shor-Steane (CSS) code had been implicitly used in the BB84 protocol, and suggested its security could be proven by bounding the fidelity, say F(n), of the incorporated CSS code of length n in the form 1-F(n) 0 whenever R < R', which is larger than the achievable rate based on the Gilbert-Varshamov bound that is essentially due to Shor and Preskill (2000). The codes in the present work are robust against fluctuations of channel parameters, which fact is needed to establish the security rigorously and was not proved for rates above the Gilbert-Varshamov rate before in the literature. As a byproduct, the security of a modified BB84 protocol against any joint (coherent) attacks is proved quantitatively.

Mitsuru Hamada

2003-08-05T23:59:59.000Z

16

Human Reliability Program Overview  

SciTech Connect (OSTI)

This presentation covers the high points of the Human Reliability Program, including certification/decertification, critical positions, due process, organizational structure, program components, personnel security, an overview of the US DOE reliability program, retirees and academia, and security program integration.

Bodin, Michael

2012-09-25T23:59:59.000Z

17

Reliability, Compliance and Security of Web?based Pre/Post?testing  

Science Journals Connector (OSTI)

Pre/post testing is an important tool for improving science education. Standard in?class administration has drawbacks such as lost class time and converting data into electronic format. These are not issues for unproctored web?based administration but there are concerns about assessment validity compliance rates and instrument security. A preliminary investigation compared astronomy students taking pre/post tests on paper to those taking the same tests over the web. The assessments included the Epistemological Beliefs Assessment for Physical Science and a conceptual assessment developed for this study. Preliminary results on validity show no significant difference on scores or on most individual questions. Compliance rates were similar between web and paper on the pretest and much better for web on the posttest. Remote monitoring of student activity during the assessments recorded no clear indication of any copying printing or saving of questions and no widespread use of the web to search for answers.

Scott Bonham

2007-01-01T23:59:59.000Z

18

Energy Security Council  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

19

Distribution expansion planning considering reliability and security of energy using modified PSO (Particle Swarm Optimization) algorithm  

Science Journals Connector (OSTI)

Abstract Distribution feeders and substations need to provide additional capacity to serve the growing electrical demand of customers without compromising the reliability of the electrical networks. Also, more control devices, such as DG (Distributed Generation) units are being integrated into distribution feeders. Distribution networks were not planned to host these intermittent generation units before construction of the systems. Therefore, additional distribution facilities are needed to be planned and prepared for the future growth of the electrical demand as well as the increase of network hosting capacity by DG units. This paper presents a multiobjective optimization algorithm for the MDEP (Multi-Stage Distribution Expansion Planning) in the presence of \\{DGs\\} using nonlinear formulations. The objective functions of the MDEP consist of minimization of costs, END (Energy-Not-Distributed), active power losses and voltage stability index based on SCC (Short Circuit Capacity). A MPSO (modified Particle Swarm Optimization) algorithm is developed and used for this multiobjective MDEP optimization. In the proposed MPSO algorithm, a new mutation method is implemented to improve the global searching ability and restrain the premature convergence to local minima. The effectiveness of the proposed method is tested on a typical 33-bus test system and results are presented.

Jamshid Aghaei; Kashem M. Muttaqi; Ali Azizivahed; Mohsen Gitizadeh

2014-01-01T23:59:59.000Z

20

Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems.  

SciTech Connect (OSTI)

Formal methods describe a class of system analysis techniques that seek to prove specific propertiesabout analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest fromboth internal and external customersof Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquelypositioned to advance the state-of-the-art with respect toseveral research and application areaswithin formal methods. This research project was a one-yeareffort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research&Development program toinvestigate the opportunities for formal methods to impactSandia's present mission areas, morefully understand the needs of the research community in the area of formal methods and whereSandia can contribute, and clarify from those potential research paths those that would best advancethe mission-area interests of Sandia. The accomplishmentsfrom this project reinforce the utilityof formal methods in Sandia, particularly in areas relevantto Cyber Security, and set the stagefor continued Sandia investments to ensure this capabilityis utilized and advanced within thislaboratory to serve the national interest.4

Ruthruff, Joseph; Armstrong, Robert C.; Davis, Benjamin Garry; Mayo, Jackson; Punnoose, Ratish J.

2012-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Safety, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

22

Human Reliability Program Workshop  

SciTech Connect (OSTI)

A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security and the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.

Landers, John; Rogers, Erin; Gerke, Gretchen

2014-05-18T23:59:59.000Z

23

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication  

E-Print Network [OSTI]

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho Chakravarty #12;ABSTRACT Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho the true network identity of com- municating parties against eavesdropping adversaries. Tor, acronym

Keromytis, Angelos D.

24

Office of Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

25

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

26

Transmission Reliability | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transmission Reliability Transmission Reliability Transmission Reliability Modernizing America's electricity infrastructure is one of the U.S. Department of Energy's top priorities. The DOE Strategic Plan states that today's electric grid needs to be more efficient, reliable, and secure. A modern, smarter electric grid may save consumers money, help our economy run more efficiently, allow rapid growth in renewable energy sources, and enhance energy reliability. The Department's research into a variety of tools that will improve advanced system monitoring, visualization, control, operations, and market structure will ultimately modernize the electricity transmission infrastructure to ease congestion, allow for increases in demand, and provide a greater degree of security. The Transmission Reliability Program is aligned with this strategic plan

27

absolute latency plasma: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of the low-latency gravitational-wave triggers. The results of the electromagnetic image analysis will be described elsewhere. Results. Over the course of the science... ,...

28

Office of Security Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

29

Low Latency Stochastic Filtering Software Firewall Architecture  

E-Print Network [OSTI]

Firewalls are an integral part of network security. They are pervasive throughout networks and can be found in mobile phones, workstations, servers, switches, routers, and standalone network devices. Their primary responsibility is to track...

Ghoshal, Pritha

2012-08-29T23:59:59.000Z

30

Security Application of Failure Mode and Effect Analysis (FMEA)  

Science Journals Connector (OSTI)

Increasingly complex systems lead to an interweaving of security, safety, availability and reliability concerns. Most dependability analysis techniques do not include security aspects. In order to include securit...

Christoph Schmittner; Thomas Gruber

2014-01-01T23:59:59.000Z

31

Low latency and persistent data storage  

SciTech Connect (OSTI)

Persistent data storage is provided by a computer program product that includes computer program code configured for receiving a low latency store command that includes write data. The write data is written to a first memory device that is implemented by a nonvolatile solid-state memory technology characterized by a first access speed. It is acknowledged that the write data has been successfully written to the first memory device. The write data is written to a second memory device that is implemented by a volatile memory technology. At least a portion of the data in the first memory device is written to a third memory device when a predetermined amount of data has been accumulated in the first memory device. The third memory device is implemented by a nonvolatile solid-state memory technology characterized by a second access speed that is slower than the first access speed.

Fitch, Blake G; Franceschini, Michele M; Jagmohan, Ashish; Takken, Todd

2014-11-04T23:59:59.000Z

32

Method of data communications with reduced latency  

DOE Patents [OSTI]

Data communications with reduced latency, including: writing, by a producer, a descriptor and message data into at least two descriptor slots of a descriptor buffer, the descriptor buffer comprising allocated computer memory segmented into descriptor slots, each descriptor slot having a fixed size, the descriptor buffer having a header pointer that identifies a next descriptor slot to be processed by a DMA controller, the descriptor buffer having a tail pointer that identifies a descriptor slot for entry of a next descriptor in the descriptor buffer; recording, by the producer, in the descriptor a value signifying that message data has been written into descriptor slots; and setting, by the producer, in dependence upon the recorded value, a tail pointer to point to a next open descriptor slot.

Blocksome, Michael A; Parker, Jeffrey J

2013-11-05T23:59:59.000Z

33

Low latency and persistent data storage  

DOE Patents [OSTI]

Persistent data storage is provided by a method that includes receiving a low latency store command that includes write data. The write data is written to a first memory device that is implemented by a nonvolatile solid-state memory technology characterized by a first access speed. It is acknowledged that the write data has been successfully written to the first memory device. The write data is written to a second memory device that is implemented by a volatile memory technology. At least a portion of the data in the first memory device is written to a third memory device when a predetermined amount of data has been accumulated in the first memory device. The third memory device is implemented by a nonvolatile solid-state memory technology characterized by a second access speed that is slower than the first access speed.

Fitch, Blake G; Franceschini, Michele M; Jagmohan, Ashish; Takken, Todd E

2014-02-18T23:59:59.000Z

34

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

2010-10-19T23:59:59.000Z

35

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

2007-02-06T23:59:59.000Z

36

A Latency-Determining/User Directed Firefox Browser Extension  

E-Print Network [OSTI]

" Mozilla Firefox extension which was originally developed by Sterbenz et. al., in 2002. This these describes the architecture and prototype implementation, followed with an analysis of its effectiveness to predict latency and future work...

Mein, Philip

2012-12-31T23:59:59.000Z

37

Electricity Reliability  

E-Print Network [OSTI]

Electricity Delivery and Energy Reliability High Temperature Superconductivity (HTS) Visualization in the future because they have virtually no resistance to electric current, offering the possibility of new electric power equipment with more energy efficiency and higher capacity than today's systems

38

Electricity Delivery and Energy Reliability  

Broader source: Energy.gov (indexed) [DOE]

The Office of Electricity Delivery and Energy Reliability (OE) drives electric grid modernization and resiliency in the energy infrastructure while working to enable innovation across the energy sector, empowering American consumers, and securing our energy future. The OE mission and the leadership role OE plays in the energy industry directly support the President's effort to accelerate the transformation of America's energy system

39

Nuclear Deterrence | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and reliable U.S. nuclear deterrent, which is essential to national security. Every weapon in the U.S. nuclear stockpile has components manufactured, maintained or ultimately...

40

Plutonium Pits | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

To ensure the reliability, safety, and security of nuclear weapons without underground nuclear testing; weapons go through a surveillance process, where they are regularly taken...

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

42

Data Communication Principles Reliable Data Transfer  

E-Print Network [OSTI]

Principles Switching Reliable Data Transfer Data Rate of a Communication Channel Transmission Media Data Principles Switching Reliable Data Transfer Data Rate of a Communication Channel Transmission Media Data Transmission Fiber vs Copper Wire Weight vs bandwidth Cost Security 11 / 52 #12;Data Communication Principles

Ramkumar, Mahalingam

43

Reliable low latency I/O in torus-based interconnection networks  

E-Print Network [OSTI]

In today's high performance computing environment I/O remains the main bottleneck in achieving the optimal performance expected of the ever improving processor and memory technologies. Interconnection networks therefore combines processing units...

Azeez, Babatunde

2007-04-25T23:59:59.000Z

44

Electricity Delivery and Energy Reliability PROGRAM DESCRIPTION  

Broader source: Energy.gov (indexed) [DOE]

2 2 Electricity Delivery and Energy Reliability PROGRAM DESCRIPTION The Office of Electricity Delivery and Energy Reliability (OE) leads national efforts to modernize the electric grid, enhance security and reliability of energy infrastructure, and facilitate recovery from disruptions to the energy supply. As stated in the President's A Policy Framework for the 21 st Century Grid, a smarter, modernized electric grid is fundamental to transforming the Nation's energy system and securing US leadership in a clean energy future. OE supports activities that enable innovation across the energy sector, empower American consumers, and secure our energy future. OE consists of three programs: Research and Development; Permitting, Siting and Analysis; and Infrastructure Security and Energy Restoration.

45

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

46

Chief Medical Officer: Occupational Medicine in Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Security requirements provide for the medical assessment of employees to identify potential threats against the nuclear information, materials, and weapons over which DOE holds jurisdiction. When effectively integrated with the services of personnel security, counterintelligence, and other allied security professionals, medical services contribute directly to national security. In addition, workplace violence has increasingly been recognized as safety and security concern which warrants organizational planning and response. The following policy, guidance, and additional resources may apply. 1. Access Authorization Programs 2. Human Reliability Programs 3. Physical Protection Programs 4. Workplace Violence Programs 5. Counterintelligence Programs

47

Sensor network minimal energy routing with latency guarantees  

Science Journals Connector (OSTI)

We consider wireless sensor networks with nodes switching ON (awake) and OFF (sleeping) to preserve energy, and transmitting data over channels with varying quality. The objective is to determine the best path from each node to a single gateway. Performance ... Keywords: energy and resource management, large deviations, latency, routing, sensor networks, sleeping schedule

Wei Lai; Ioannis Ch. Paschalidis

2007-09-01T23:59:59.000Z

48

Latency, Occupancy, and Bandwidth in DSM Multiprocessors: A Performance Evaluation  

E-Print Network [OSTI]

Latency, Occupancy, and Bandwidth in DSM Multiprocessors: A Performance Evaluation Mainak Chaudhuri in the communication architecture of a DSM multiprocessor offers advantages in cost and design time, the impact modeling, and experiments on a flexible DSM prototype, using a range of parallel applications. We adapt

Heinrich, Mark

49

North American Electric Reliability Corporation (NERC): Reliability  

Broader source: Energy.gov (indexed) [DOE]

Corporation (NERC): Reliability Corporation (NERC): Reliability Considerations from the Integration of Smart Grid North American Electric Reliability Corporation (NERC): Reliability Considerations from the Integration of Smart Grid North American Electric Reliability Corporation (NERC): Reliability Considerations from the Integration of Smart Grid. NERC develops and enforces Reliability Standards; assesses adequacy annually via a ten-year forcast and winter and summer forecasts; monitors the bulk power systems; and educates, trains, and certifies industry personnel. North American Electric Reliability Corporation (NERC): Reliability Considerations from the Integration of Smart Grid More Documents & Publications Re: DOE Request for Information - Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to

50

Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks  

Science Journals Connector (OSTI)

Secure and pervasive internet access is the goal of present research in wireless networks realm. Wireless Mesh Network (WMN) is expected to be the most widely used network in the near future to make the anywhere-anytime internet access into ... Keywords: handoff latency, handoff mechanisms, hybrid routing, key management, mobility management, pervasive internet access, security, simulation, urban WMN:, wireless mesh networks, wireless networks

Ramanarayana Kandikattu; Lillykutty Jacob

2008-10-01T23:59:59.000Z

51

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

52

Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

53

The latency insertion method for simulations of phase-locked loops  

Science Journals Connector (OSTI)

In this paper, we present two methods for the simulations of phase-locked loops (PLL) based on the latency insertion method (LIM). First, we present a novel and simple behavioral model based simulation method that exploits the latency in the PLL formulation ... Keywords: Latency insertion method (LIM), Phase-locked loop (PLL), Simulation

P. Goh, J. E. Schutt-Ain

2014-06-01T23:59:59.000Z

54

Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

- ing MAC protocols are optimized to conserve energy, trad- ing off latency, throughput and other of sensor nodes with minimum latency and without requir- ing any cooperation or pre-scheduling among the application demands better perfor- mance at the expense of some additional energy. If latency

Namboodiri, Vinod

55

Ubik: efficient cache sharing with strict qos for latency-critical workloads  

Science Journals Connector (OSTI)

Chip-multiprocessors (CMPs) must often execute workload mixes with different performance requirements. On one hand, user-facing, latency-critical applications (e.g., web search) need low tail (i.e., worst-case) latencies, often in the millisecond range, ... Keywords: cache partitioning, interference, isolation, multicore, quality of service, resource management, tail latency

Harshad Kasture, Daniel Sanchez

2014-02-01T23:59:59.000Z

56

In the blink of an eye: investigating latency perception during stylus interaction  

Science Journals Connector (OSTI)

While pen computing has become increasingly more popular, device responsiveness, or latency, still plagues such interaction. Although there have been advances in digitizer technology over the last few years, commercial end-to-end latencies are unfortunately ... Keywords: latency, pen, pen computing, perception, psychophysics, stylus

Albert Ng; Michelle Annett; Paul Dietz; Anoop Gupta; Walter F. Bischof

2014-04-01T23:59:59.000Z

57

Application-aware secure multicast for power grid communications  

Science Journals Connector (OSTI)

We propose an application-aware approach to setting up secure multicast groups for power grid communications that automatically derives group memberships and verifies configuration conformance from data dependencies in system specifications. We design an abstract multicast model, analysis algorithms, and configuration derivation techniques. These are implemented in a prototype system, SecureSCL. We also provide experimental evidence that IPsec multicast can address latency constraints in power substation networks.

Jianqing Zhang; Carl A. Gunter

2011-01-01T23:59:59.000Z

58

NREL: Gearbox Reliability Collaborative - Gearbox Reliability Collaborative  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Publications Publications Screenshot of the cover of an NREL report, titled Gearbox Reliability Collaborative Project Report: Findings from Phase 1 and Phase 2 testing. The NREL wind research program's Gearbox Reliability Collaborative publishes reports and presentations of its activities. General Gearbox Reliability Collaborative Phase 3 Gearbox 2 Test Plan 2013 DOE/NREL Gearbox Reliability Collaborative: All Members Meeting Agenda 2012 Gearbox Reliability Collaborative Phase 1 and 2: Testing and Modeling Results 2012 Gearbox Reliability Collaborative Update: A Brief (Presentation) Jan 2012 Gearbox Reliability Collaborative Update (Presentation) April 2012 NREL Collaborates to Improve Wind Turbine Technology (Fact Sheet) 2012 Gearbox Reliability Collaborative - Phase 1 and 2 Overview

59

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

60

Secure internet access to SAPs R3: keeping dragons out  

Science Journals Connector (OSTI)

The security of the networking environment is critical for todays corporations. Issues such as reliably identifying remote-access users, checking authorizations, data-transfer security and database security are of paramount importance. This article ...

Katherine Jones

1998-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

A Grid Security Infrastructure Based on Behaviors and Trusts  

Science Journals Connector (OSTI)

Computational Grids need support the distributed high performance computing with security and reliability. While the fact is when ... destroy the whole system. For solving these security problems in Grids, a Grid

Xiaolin Gui; Bing Xie; Yinan Li; Depei Qian

2004-01-01T23:59:59.000Z

62

Welcome to the Los Alamos Field Office | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

security, reliability and performance of the U.S. nuclear weapons stockpile without nuclear testing; works to reduce global danger from weapons of mass destruction; provides...

63

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

64

College of Electricity Delivery and Energy Reliability | Department of  

Broader source: Energy.gov (indexed) [DOE]

Electricity Delivery and Energy Reliability Electricity Delivery and Energy Reliability College of Electricity Delivery and Energy Reliability College of Electricity Delivery and Energy Reliability Vision OE recognizes that our Nation's sustained economic prosperity, quality of life, and global competitiveness depend on access to an abundance of secure, reliable, and affordable energy resources. Through a mix of technology and policy solutions, we will address the changing dynamics and uncertainties in which the electric system will operate. We will leverage effective partnerships, solid research, and best practices to address diverse interests in achieving economic, societal, and environmental objectives. Resources Explore the following topics at OE's College of Electricity Delivery and Energy Reliability:

65

Grid Reliability- An Electric Utility Company's Perspective  

Broader source: Energy.gov [DOE]

Presentationgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meetingcovers Southern Company's business continuity, North American Electric Reliability Corporation (NERC) cybersecurity, and homeland security as well as physical recovery after a major outage, and five questions to ask your local utility.

66

Security Cases  

Broader source: Energy.gov (indexed) [DOE]

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

67

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

68

A low-latency resilient protocol for e-business transactions  

Science Journals Connector (OSTI)

This paper proposes a novel protocol for e-business transaction management, called the low latency resilient (LLR) protocol. LLR applies new correctness criteria based upon enforcing semantic atomicity with increased resilience to failure, ... Keywords: CCS, SACReD transactions, calculus of communicating systems, e-business, electronic business, evaluation of commit protocols, formal specification, latency of transaction commit protocols, low latency resilient protocol, performance, resiliency, resource blocking, transaction management

Muhammad Younas; Barry Eaglestone; Kuo-Ming Chao

2004-09-01T23:59:59.000Z

69

Memory access protocol for the HOLMS low latency opto-electronic memory system  

Science Journals Connector (OSTI)

High fanin and fanout is among the chief advantages of optics allowing low latency, direct interconnects. Unfortunately high fanin system often have problems with access conflicts. We...

Carrera, Roberto Barbieri; Benabs, Philippe; Lukowicz, Paul; Wirz, Marco; Trster, Gerhard; Gauthier, A; Oksman, J

70

Innovations for a secure nation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Innovations for a Secure Nation Innovations for a Secure Nation /about/_assets/images/icon-70th.jpg Innovations for a Secure Nation LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. image description Plasma technology for textile finishing applications gets a boost from LANL APJeT received a $100,000 Venture Acceleration Fund award from LANS helping to complete design and engineering of a commercial-scale production unit. - 4/3/12 One of several active projects, LANL and Chevron co-developed INFICOMM(tm), a wireless technology used to collect real-time temperature and pressure information from sensors in oil and gas wells, including very deep wells already producing oil and gas and drilling operations for new wells.

71

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

April 19, 2013 April 19, 2013 PSH-13-0006 - In the Matter of Personnel Security Hearing DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's history of criminal conduct, financial problems, and past use of alcohol habitually to excess. The LSO also cited the report of a DOE Psychologist, in which he identified the individual's lack of control over his spending and use of alcohol as a mental condition that causes a significant defect in his judgment and reliability. April 17, 2013 PSH-12-0143 - In the Matter of Personnel Security On April 17, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should not restore an individual's access authorization. As security concerns under Criteria H, J, and L of 10 CFR

72

Adaptive Infrastructures Toward a Secure and  

E-Print Network [OSTI]

Economic load dispatch 10 seconds to 1 hour; ongoing Thermodynamic changes from boiler control action (slow network, secure communications and intelligent software agents; 3) active-control of high-voltage devices stability, reliability, robustness, security and efficiency in a competitive marketplace and carbon

Amin, S. Massoud

73

Reliability-Centered Maintenance  

Broader source: Energy.gov [DOE]

Reliability-centered maintenance leverages the same practices and technologies of predictive maintenance.

74

North American Electric Reliability Corporation (NERC): Reliability...  

Broader source: Energy.gov (indexed) [DOE]

and winter and summer forecasts; monitors the bulk power systems; and educates, trains, and certifies industry personnel. North American Electric Reliability Corporation...

75

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

76

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Broader source: Energy.gov (indexed) [DOE]

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

77

Measuring and Improving Latency to Avoid Test Suite Wear Out Shin Yoo & Mark Harman  

E-Print Network [OSTI]

Measuring and Improving Latency to Avoid Test Suite Wear Out Shin Yoo & Mark Harman King's College London Centre for Research on Evolution, Search & Testing (CREST) London, UK {shin.yoo, mark introduces the concept of test suite latency. The more latent a test suite, the more it is possible

Singer, Jeremy

78

Discovering Regulated Networks During HIV-1 Latency and Reactivation Sourav Bandyopadhyay, Ryan Kelley, and Trey Ideker  

E-Print Network [OSTI]

corresponding to stages of HIV synthesis. In the early stage, fully spliced mRNAs for Rev, Tat and NefDiscovering Regulated Networks During HIV-1 Latency and Reactivation Sourav Bandyopadhyay, Ryan NETWORKS DURING HIV-1 LATENCY AND REACTIVATION SOURAV BANDYOPADHYAY, RYAN KELLEY, TREY IDEKER1,2 1 Program

79

DESIGN AND IMPLEMENTATION OF OPTIMISTIC CONSTRUCTS FOR LATENCY MASKING IN ONLINE VIDEO GAMES  

E-Print Network [OSTI]

, optimistic execution, software design patterns for games. ABSTRACT To achieve interactive experiences difficult issue faced by developers of online games is that of latency. In many cases, the latency on experiences in using these components in the development of a simple trading game to validate

Katchabaw, Michael James

80

Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems  

E-Print Network [OSTI]

Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems 1. Introduction Parallel applications with energy and low-latency constraints are emerging monitoring. However, conventional energy-driven task allocation schemes for a cluster of embedded nodes only

Xie, Tao

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY WEEKLY REPORT  

Broader source: Energy.gov (indexed) [DOE]

RELIABILITY RELIABILITY WEEKLY REPORT April 17, 2009 Schedule Patricia A. Hoffman, Acting Assistant Secretary, does not have any travel or leave plans for the week beginning April 20, 2009. Key Departmental News OE Staff Participate in TSA/DOT Pipeline Security and Incident Recovery Planning Meeting. On April 1-2, Office of Electricity Delivery and Energy Reliability (OE) staff participated in a Transportation Security Administration (TSA) and Department of Transportation (DOT) meeting to support these agencies in developing a Pipeline Security and Incident Recovery Plan. In August of 2007, Congress passed Public Law 110 - 53, Implementing Recommendations of the 9/11 Commission Act of 2007. Section 1558 of the Act tasked the Secretary of Homeland Security (DHS/TSA) and the Secretary

82

Power System Security in Market Clearing and Dispatch Mechanisms  

E-Print Network [OSTI]

costs while maintaining grid security; however, the dominant concern was system reliability, while costs1 Power System Security in Market Clearing and Dispatch Mechanisms Claudio A. Ca~nizares, Senior typical market clearing and dispatch mechanisms based on security- constrained (SC) optimal power flow

Cañizares, Claudio A.

83

The four `R's of energy security1 Larry Hughes  

E-Print Network [OSTI]

security, this paper introduces the "four `R's of energy security": review (understanding the problem 2002). Energy security, the reliable supply of energy at an affordable price (IEA 2001), is becoming to the general public, policy analysts, and politicians. The methodology consists of four `R's: review

Hughes, Larry

84

Lab announces security changes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

85

SECURING HARDWARE, SOFTWARE AND DATA  

Broader source: Energy.gov (indexed) [DOE]

of the Cyber Security of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability i PNNL-16971 Report of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability iii Acknowledgements The workshop chairs wish to thank Joree O'Neal and Rachel Smith for all their help and support with organizing the logistics and registration activities for this workshop; Sue Chin, Ted Tanasse, Barbara Wilson, and Stacy Larsen for their expert help with the assembly, text editing, and graphics for this report; and Lance Baatz for his masterful

86

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

87

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

88

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

89

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

90

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

91

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

92

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

93

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

94

Reliable Networking Infrastructures A Brief Overview of Research in Reliable Networking  

E-Print Network [OSTI]

Institute FOKUS, Berlin ++ www.fokus.fraunhofer.de/go/innovation ++ 11­2009 #12;Security Reliable Networking structure (RNI) Group Launched by Dr.Yacine Rebahi and Dragos Ving arzan at Fraunhofer FOKUS. Senior at the Fraunhofer FOKUS competence center NGNI. Prior to joining FOKUS in 2002, he worked at Ericsson in Voice over

Wichmann, Felix

95

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

96

Power electronics reliability analysis.  

SciTech Connect (OSTI)

This report provides the DOE and industry with a general process for analyzing power electronics reliability. The analysis can help with understanding the main causes of failures, downtime, and cost and how to reduce them. One approach is to collect field maintenance data and use it directly to calculate reliability metrics related to each cause. Another approach is to model the functional structure of the equipment using a fault tree to derive system reliability from component reliability. Analysis of a fictitious device demonstrates the latter process. Optimization can use the resulting baseline model to decide how to improve reliability and/or lower costs. It is recommended that both electric utilities and equipment manufacturers make provisions to collect and share data in order to lay the groundwork for improving reliability into the future. Reliability analysis helps guide reliability improvements in hardware and software technology including condition monitoring and prognostics and health management.

Smith, Mark A.; Atcitty, Stanley

2009-12-01T23:59:59.000Z

97

ATLAS SCT L1 Trigger Latency Budget Specification V1.00 15-Oct-1999 ATLAS Specification  

E-Print Network [OSTI]

Page 1 ATLAS SCT L1 Trigger Latency Budget Specification V1.00 15-Oct-1999 ATLAS Specification Name: ATLAS SCT L1 Trigger Latency Budget Version: 1.00 Revision History Revision Change Description, Pages-Oct-1999 #12;Page 2 ATLAS SCT L1 Trigger Latency Budget Specification V1.00 15-Oct-1999 Table

California at Santa Cruz, University of

98

Energy Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

99

NREL: Gearbox Reliability Collaborative - Gearbox Reliability Collaborative  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

All Members Meeting All Members Meeting The Gearbox Reliability Collaborative (GRC) All Members Meeting was held on February 4-5, 2013. The meeting covered advancements made across the NREL GRC project and the latest industry updates on gearbox reliability and operations and maintenance practices. The presentations covered gearbox design updates, gearbox testing updates, experimental data analysis, and operations and maintenance research. Presentations Monday, February 4 Time Presenter Organization Presentation 8:30 a.m. Paul Veers NREL Welcome 8:45 a.m. Mike Derby DOE Overview 9:05 a.m. Jon Keller NREL Gearbox Reliability Collaborative Status and Plans 9:20 a.m. Hal Link NREL New Gearbox #2 Test Plan 9:40 a.m. Hal Link NREL NWTC Dynos and Grid Simulator 10:00 a.m. Jon Keller/Brian McNiff NREL/MLI Gearbox Reliability Collaborative, Phase 3: High Speed Shaft Bearing Loads

100

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

February 14, 2012 February 14, 2012 PSH-11-0002 - In the Matter of Personnel Security Hearing The administrative review proceeding began with the issuance of a Notification Letter to the Individual. See 10 C.F.R. 710.21. The letter informed the Individual that information in the possession of the DOE created a substantial doubt concerning her eligibility for a security clearance. Specifically, the Local Security Office (LSO) characterized this information as indicating that the Individual had engaged in unusual conduct which brought her honesty, trustworthiness, and reliability into question, and been diagnosed by a psychologist with alcohol abuse. February 9, 2012 PSH-11-0015 - In the Matter of Personnel Security Hearing The individual is employed by a DOE contractor in a position that requires

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Reliability and the Federal Energy Regulatory Commission  

Broader source: Energy.gov (indexed) [DOE]

and the Federal Reliability and the Federal and the Federal Reliability and the Federal Energy Regulatory Energy Regulatory Commission Commission Michael Peters Michael Peters Energy Infrastructure & Cyber Security Advisor Energy Infrastructure & Cyber Security Advisor Federal Energy Regulatory Commission Federal Energy Regulatory Commission 202 202 - - 502 502 - - 8461 8461 Michael.Peters@FERC.GOV Michael.Peters@FERC.GOV The views expressed in this The views expressed in this presentation do not represent the presentation do not represent the views of the Federal Energy views of the Federal Energy Regulatory Commission or the United Regulatory Commission or the United States. States. These views are the personal opinion These views are the personal opinion of Mike Peters!!!! of Mike Peters!!!! ☺ ☺ ☺ ☺ ☺ ☺

102

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

103

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

104

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

105

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

106

Cyber security best practices for the nuclear industry  

SciTech Connect (OSTI)

When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

2012-07-01T23:59:59.000Z

107

Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

108

ENERGY SECURITY  

Broader source: Energy.gov (indexed) [DOE]

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

109

NREL: Performance and Reliability R&D - PV Module Reliability...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reliability R and D Printable Version PV Module Reliability Workshop NREL hosts an annual Photovoltaic Module Reliability Workshop (PVMRW) so that solar technology experts can...

110

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

111

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

112

Security Rulemaking  

Broader source: Energy.gov (indexed) [DOE]

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

113

A High-Performance Optoelectronic Interconnect Router: Using Increased Bandwidth to Enable Latency Reduction  

E-Print Network [OSTI]

D R A FT 1 A High-Performance Optoelectronic Interconnect Router: Using Increased Bandwidth optoelectronic interconnection network router capable of supplying and efficiently utilizing higher bandwidth routing, interconnection network, latency hiding/reduction techniques, optoelectronic router. 1

Pinkston, Timothy M.

114

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

115

Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Electricity Delivery & Energy Reliability FY 2012 Budget Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation Presentation by Patricia Hoffman of the Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request. OE's FY 2012 budget request represents a strong commitment to modernizing the grid and providing the reliable, affordable, and secure electric power needed to expand economic recovery enable sources Office of Electricity Delivery and Energy Reliability recovery, the transition to renewable energy sources, and achieve the President's clean energy goals. Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation More Documents & Publications

116

Medical Aspects of Reliability  

SciTech Connect (OSTI)

This presentation covers the medical evaluation as part of a human reliability program, particularly the various medical qualifications and potential disqualifiers.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

117

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

118

HEU Minimization and the Reliable Supply of Medical Isotopes Nuclear  

National Nuclear Security Administration (NNSA)

HEU Minimization and the Reliable Supply of Medical Isotopes Nuclear HEU Minimization and the Reliable Supply of Medical Isotopes Nuclear Security Summit: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > HEU Minimization and the Reliable Supply of ... Fact Sheet HEU Minimization and the Reliable Supply of Medical Isotopes Nuclear

119

Hawaii electric system reliability.  

SciTech Connect (OSTI)

This report addresses Hawaii electric system reliability issues; greater emphasis is placed on short-term reliability but resource adequacy is reviewed in reference to electric consumers' views of reliability %E2%80%9Cworth%E2%80%9D and the reserve capacity required to deliver that value. The report begins with a description of the Hawaii electric system to the extent permitted by publicly available data. Electrical engineering literature in the area of electric reliability is researched and briefly reviewed. North American Electric Reliability Corporation standards and measures for generation and transmission are reviewed and identified as to their appropriateness for various portions of the electric grid and for application in Hawaii. Analysis of frequency data supplied by the State of Hawaii Public Utilities Commission is presented together with comparison and contrast of performance of each of the systems for two years, 2010 and 2011. Literature tracing the development of reliability economics is reviewed and referenced. A method is explained for integrating system cost with outage cost to determine the optimal resource adequacy given customers' views of the value contributed by reliable electric supply. The report concludes with findings and recommendations for reliability in the State of Hawaii.

Silva Monroy, Cesar Augusto; Loose, Verne William

2012-09-01T23:59:59.000Z

120

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Message Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

122

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

123

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

124

Engineering | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Engineering | National Nuclear Security Administration Engineering | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Engineering Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Engineering Engineering NNSA uses modern tools and capabilities in the engineering sciences field which are needed to ensure the safety, security, reliability and

125

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

126

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

127

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

128

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

129

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

130

Physical Security Systems | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

131

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

132

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

133

Production Technology | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Production Technology | National Nuclear Security Administration Production Technology | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Production Technology Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Production Technology Production Technology NNSA continues to assure the safety, security, and reliability of the

134

Reliability Standards Owner  

Broader source: Energy.gov [DOE]

This position is located in the Internal Operations and Asset Management group of Planning and Asset Management (TP). A successful candidate in this position will serve as the Reliability Standards...

135

NREL: Gearbox Reliability Collaborative - Gearbox Reliability Collaborative  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Projects Projects Gearbox deficiencies are the result of many factors. Through gearbox modeling and testing, condition monitoring, and the failure database, the collaborative is expanding the industry's knowledge base, recommending efficient and cost-effective improvements, and facilitating immediate improvements in the gearbox life cycle. Gearbox Modeling and Testing Illustration of representative gearbox including the hub, main bearing, main shaft, gearbox, brake, high speed shaft, generator, and bed plate. A complete gearbox redesign has been completed in a collaborative effort between NREL and industry partners. This process documented and analyzed the design process and produced a new gearbox design that integrates knowledge from previous Gearbox Reliability Collaborative (GRC) activities.

136

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Broader source: Energy.gov (indexed) [DOE]

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

137

Fast Process Security Assessment Theory Korkut Uygun and Yinlun Huang  

E-Print Network [OSTI]

reactor examples are studied to demonstrate the methodology for security-threat analysis. © 2004 American conditions will be reached in worst-case scenarios). Computational efficiency and reliability are achieved Institute of Chemical Engineers AIChE J, 50: 2187­2202, 2004 Keywords: process security, -analysis, priority

Huang, Yinlun

138

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

139

Nonproliferation & International Security | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

140

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

142

Gearbox Reliability Collaborative Update (Presentation)  

SciTech Connect (OSTI)

This presentation was given at the Sandia Reliability Workshop in August 2013 and provides information on current statistics, a status update, next steps, and other reliability research and development activities related to the Gearbox Reliability Collaborative.

Sheng, S.

2013-10-01T23:59:59.000Z

143

Parametric probability distributions in reliability  

E-Print Network [OSTI]

Parametric probability distributions in reliability F.P.A. Coolen Department of Mathematical parametric probability distributions which are frequently used in reliability. We present some main as models for specific reliability scenarios. Keywords: Binomial distribution, Exponential distribution

Coolen, Frank

144

MULTIAREA SYSTEM RELIABILITY: THE ECONOMIC EVALUATION OF SYSTEM SECURITY CRITERIA  

E-Print Network [OSTI]

Committee: Professor George Gross Professor Peter W. Sauer Professor Thomas J. Overbye Professor M. A. Pai Associate Professor George Deltas Assistant Professor Uday V. Shanbhag Dr. Eugene Litvinov, ISO New England

Gross, George

145

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

146

Transportation Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

147

Office of Electricity Delivery and Energy Reliability FY 2010 Budget |  

Broader source: Energy.gov (indexed) [DOE]

FY 2010 FY 2010 Budget Office of Electricity Delivery and Energy Reliability FY 2010 Budget The FY 2010 Office of Electricity Delivery and Energy Reliability (OE) budget request is $208.0 million, $71.0 million more than the FY 2009 Appropriation. This increase reflects increased investments in research and development, particularly in energy storage, smart grid technologies, and cyber security areas. OE will also establish one of the Department's multi-disciplinary Energy Innovation Hubs (Hubs) that specifically focuses on Grid Materials, Devices, and Systems. The FY 2010 budget proposes a budget structure change to better align with the Department's priorities to establish a clean, secure energy future. Office of Electricity Delivery and Energy Reliability FY 2010 Budget

148

Techniques for Reducing Read Latency of Core Bus Wrappers Roman L. Lysecky, Frank Vahid, Tony D. Givargis  

E-Print Network [OSTI]

Techniques for Reducing Read Latency of Core Bus Wrappers Roman L. Lysecky, Frank Vahid, Tony D with their internal logic separated from their bus wrapper. This separation may introduce extra read latency. Pre. In this paper, we introduce a technique for automatically designing a pre-fetch unit that satisfies user

Vahid, Frank

149

An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Networks  

E-Print Network [OSTI]

nodes to a sink through a unidirectional tree. In this paper, we propose DMAC, an energy efficient gathering trees in sensor networks, DMAC provides significant energy savings and latency re- duction whileAn Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Networks

Krishnamachari, Bhaskar

150

On Load Latency in Low-Power Caches Soontae Kim, N. Vijaykrishnan, M. J. Irwin and L. K. John  

E-Print Network [OSTI]

On Load Latency in Low-Power Caches Soontae Kim, N. Vijaykrishnan, M. J. Irwin and L. K. John: Load latency, low-power, caches 1. INTRODUCTION Current superscalar processors, such as Alpha 21264 [7 logic can be used. However, when the load cannot provide the data within the fixed number of cycles

John, Lizy Kurian

151

TABLE OF CONTENTS Risk Analysis Methods Adapted to Computer Security (Revised Paper)  

E-Print Network [OSTI]

Security e Espionage e Terrorism e Nuclear Theft Environmental Risk Computer Reliability Health & Safety#12;TABLE OF CONTENTS Title Page Risk Analysis Methods Adapted to Computer Security (Revised Security Lattice Management c. T. Fe~guson & c. B. Murphy . . . · · . . . 15 Gould Computer Systems

152

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

153

An AWGR based Low-Latency Optical Switch for Data Centers and High Performance Computing Systems  

E-Print Network [OSTI]

i An AWGR based Low-Latency Optical Switch for Data Centers and High Performance Computing Systems based optical switch for data centers and high performance computing systems that builds upon several for Data Centers and High Performance Computing Systems ..i ABSTRACT .....................................

Kolner, Brian H.

154

Service-Oriented Heterogeneous Resource Sharing for Optimizing Service Latency in Mobile Cloud  

E-Print Network [OSTI]

Service-Oriented Heterogeneous Resource Sharing for Optimizing Service Latency in Mobile Cloud for mobile cloud applications and services. In this paper, we propose an architecture and mathematical frame- work for heterogeneous resource sharing based on the key idea of service-oriented utility functions

Mandayam, Narayan

155

Reducing WWW Latency and Bandwidth Requirements by RealTime Distillation  

E-Print Network [OSTI]

Reducing WWW Latency and Bandwidth Requirements by Real­Time Distillation Armando Fox and Eric A Distillation and Refinement Can Help 1. The Concept of Datatype­Specific Distillation 2. Refinement 3. Trading. Optimizing for Rendering on Impoverished Devices 3. An Implemented HTTP Proxy Based on Real­Time Distillation

California at Berkeley, University of

156

The Role of Back-Pressure in Implementing Latency-Insensitive Systems  

E-Print Network [OSTI]

Figure 1. Shell encapsulation, relay station insertion and channel back-pressure. practical advantagesThe Role of Back-Pressure in Implementing Latency-Insensitive Systems Luca P. Carloni Department of Computer Science Columbia University in the City of New York, New York, NY Abstract Back-pressure

Carloni, Luca

157

A Framework for Optimization of Operational Latency in Wireless Networks Eun-Sook Sung  

E-Print Network [OSTI]

utilization to achieve maximum throughput, minimization of energy usage by reducing low-power nodes' idle time a scheduling method. To complete collision-free transmission in minimum time slots a graph-coloring scheme, and minimization of latency to serve time-critical applications. We consider networks consisting of energy

Potkonjak, Miodrag

158

TONAK: A Distributed Low-latency and Scalable Optical Switch Architecture  

E-Print Network [OSTI]

. Simulations results for a 128-port switch show high throughput and low average packet latency for offered loads of up to 75%, while achieving an energy efficiency of 50pJ/bit. Introduction The ever-growing demand for cloud-based services and high-performance computing is posing major challenges

Yoo, S. J. Ben

159

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

160

Security for grids  

SciTech Connect (OSTI)

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Reliable quantum computers  

Science Journals Connector (OSTI)

...the performance of a useful quantum computer will need to be. And that in itself...by the Department of Energy under Grant No. DE- FG03-92-ER40701, and...Lond. A (1998) Reliable quantum computers 409 References Aharonov, D. & Ben-Or...

1998-01-01T23:59:59.000Z

162

Wood Durability Service & Reliability  

E-Print Network [OSTI]

Wood Durability Laboratory Service & Reliability Equipment & Facilities Field sites for AWPA E-7 (mold) tests. Wood weathering facilities. Lab-scale pressure treating cylin- ders. X-ray preservative analyzer (Oxford Twin-X). State-of-the-art facilities for wood and plastics composites manufacturing

163

North American Electric Reliability Corporation Interconnections...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

North American Electric Reliability Corporation Interconnections North American Electric Reliability Corporation Interconnections Map of the North American Electric Reliability...

164

Reliability of Electrical Interconnects (Presentation)  

SciTech Connect (OSTI)

This presentation discusses the status of NREL's research on the reliability of electrical interconnects.

Devoto, D.

2014-06-01T23:59:59.000Z

165

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA  

Broader source: Energy.gov (indexed) [DOE]

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA Briefings on Physical Security of Electricity Substations The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations. The session for FEMA Region IX will be held in San Jose, CA and hosted by

166

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

167

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

168

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

169

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

170

Security | Department of Energy  

Energy Savers [EERE]

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

171

Security & Privacy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

172

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

173

NNSA PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PERSONNEL SECURITY PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION Contractor Federal Name (Last, First, Middle): Suffix: Date of Birth: Social Security Number: Place of Birth (city and state/country): Citizenship(s): Email Address: Employer (legal name): Job Title: Required: LOCATION/BILLING Work Location: Contracting Office Location/SON: Prime Contract Number: Sub-contract Number: Facility Code: Employer Code: Required: CLEARANCE ACTION Requested Action(s): Clearance Level: (for employer/contract above) Clearance History Never held a clearance Previously held Currently holds Key Management Personnel (KMP)? Human Reliability Program (HRP)? PERSONNEL SECURITY USE ONLY: DOE Clearance: Special Access Program (SAP)? Yes No CLEARANCE JUSTIFICATION NARRATIVE

174

Office of Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

175

Assistant Secretary Patricia Hoffman's Remarks at the 2011 FERC Reliability  

Broader source: Energy.gov (indexed) [DOE]

Assistant Secretary Patricia Hoffman's Remarks at the 2011 FERC Assistant Secretary Patricia Hoffman's Remarks at the 2011 FERC Reliability Technical Conference -- As Prepared for Delivery Assistant Secretary Patricia Hoffman's Remarks at the 2011 FERC Reliability Technical Conference -- As Prepared for Delivery November 30, 2011 - 1:42pm Addthis Thank you for the opportunity to join you today. Everyone in this room shares a commitment to ensuring the reliability of our nation's electric grid. Together, we are committed to ensuring the safe and secure delivery of electricity to consumers. And, together, we share a commitment to doing this in a way that is economically viable, affordable, protects public health, and is environmentally sound. Historically, the electric utility sector has a strong track record of protecting the reliability of our Nation's electric grid. Working

176

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

177

The Y-12 National Security Complex 4-1 4. The Y-12 National Security Complex  

E-Print Network [OSTI]

of the Nuclear Detection and Sensor Testing Center and the Nuclear Materials Information Program Library, a premier manufacturing facility operated by B&W Y-12 for NNSA, plays a vital role in DOE's Nuclear Security a safe and reliable US nuclear weapons deterrent. The complex also retrieves and stores nuclear materials

Pennycook, Steve

178

Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

179

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

180

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Substation Configuration Reliability 1 Reliability of Substation Configurations  

E-Print Network [OSTI]

Substation Configuration Reliability 1 Reliability of Substation Configurations Daniel Nack, Iowa substation, it still contains what could be described as weak points or points of failure that would lead to loss of load. By knowing how to calculate the reliability of different substation configurations

McCalley, James D.

182

Increasing the Reliability of Reliability Jochen Brocker1,  

E-Print Network [OSTI]

Increasing the Reliability of Reliability Diagrams Jochen Br¨ocker1, and Leonard A. Smith1,2 1 University Oxford, UK Corresponding Author, cats@lse.ac.uk November 9, 2006 #12;Abstract The reliability; for the most part, ambiguities arise from variation in the distribution of forecast probabilities and from

Stevenson, Paul

183

Reliability Calculus: A Theoretical Framework To Analyze Communication Reliability  

E-Print Network [OSTI]

distribution function (CDF) of the message delays can be used as a metric to infer communication reliability. Note that the communication reliability (end-to-end delay distribution) depends on the delay-to-end delay distribution over possible routes and under different protocols to provide reliability or quality

Liu, Xue

184

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

185

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

186

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

187

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

188

Fundamentals of Structural Reliability Theory  

Science Journals Connector (OSTI)

Structural reliability analysis differs in many important ways from reliability analysis as practised in, for example, the electronics and aero-space industries, in spite of the fact that the underlying probab...

Palle Thoft-Christensen Ph. D.

1982-01-01T23:59:59.000Z

189

NERSC Computer Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

190

DOE Human Reliability Program Removals Report 2004-2006  

SciTech Connect (OSTI)

This report presents results of the comprehensive data analysis and assessment of all U.S. Department of Energy (DOE) and National Nuclear Security Administration (NNSA) facilities that have positions requiring workers to be certified in the Human Reliability Program (HRP). Those facilities include: Albuquerque, Amarillo, DOE Headquarters, Hanford, Idaho, Nevada, Oak Ridge, Oakland, and Savannah River. The HRP was established to ensure, through continuous review and evaluation, the reliability of individuals who have access to the DOEs most sensitive facilities, materials, and information.

Center for Human Reliability Studies

2007-02-01T23:59:59.000Z

191

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

192

FIELD RELIABILITY OF ELECTRONIC SYSTEMS  

E-Print Network [OSTI]

: ELECTRONIC EQUIPMENT; FAILURES; RELIABILITY; RISK ANALYSIS; SYSTEM ANALYSIS UDC: 621.38.004.64 ISBN 87 Predicted and Observed Reliability 16 3.3. Source 3 16 3.3.1. Description (Reactor Gamma Monitor) 16 3I Ww i 1 i FIELD RELIABILITY OF ELECTRONIC SYSTEMS wcwotoias R I S 0 - M - 2 4 1 8 An analytical

193

Testing for PV Reliability (Presentation)  

SciTech Connect (OSTI)

The DOE SUNSHOT workshop is seeking input from the community about PV reliability and how the DOE might address gaps in understanding. This presentation describes the types of testing that are needed for PV reliability and introduces a discussion to identify gaps in our understanding of PV reliability testing.

Kurtz, S.; Bansal, S.

2014-09-01T23:59:59.000Z

194

Advances in high-throughput speed, low-latency communication for embedded instrumentation ( 7th Annual SFAF Meeting, 2012)  

SciTech Connect (OSTI)

Scott Jordan on "Advances in high-throughput speed, low-latency communication for embedded instrumentation" at the 2012 Sequencing, Finishing, Analysis in the Future Meeting held June 5-7, 2012 in Santa Fe, New Mexico.

Jordan, Scott [Physik Instrumente] [Physik Instrumente

2012-06-01T23:59:59.000Z

195

Advances in high-throughput speed, low-latency communication for embedded instrumentation ( 7th Annual SFAF Meeting, 2012)  

ScienceCinema (OSTI)

Scott Jordan on "Advances in high-throughput speed, low-latency communication for embedded instrumentation" at the 2012 Sequencing, Finishing, Analysis in the Future Meeting held June 5-7, 2012 in Santa Fe, New Mexico.

Jordan, Scott [Physik Instrumente

2013-02-11T23:59:59.000Z

196

A Low Latency Optical Top of Rack Switch for Data Centre Networks with Minimized Processor Energy Load  

Science Journals Connector (OSTI)

We propose a low latency optical data center top of rack switch using recirculation buffering and a hybrid MZ/SOA switch architecture to reduce the network power dissipated on future...

Liu, Shiyun; Cheng, Qixiang; Wonfor, Adrian; Penty, Richard V; White, Ian; Watts, Philip M

197

Recent applications of thermal imagers for security assessment  

SciTech Connect (OSTI)

This paper discusses recent applications by Sandia National Laboratories of cooled and uncooled thermal infrared imagers to wide-area security assessment systems. Thermal imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, and commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. Until fairly recently, thermal imagers required open-loop cryogenic cooling to operate. The high cost of these systems and associated maintenance requirements restricted their widespread use. However, recent developments in reliable, closed-loop, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced maintenance requirements, extended MTBF, and are leading to reduced system cost. These technology developments are resulting in greater availability and practicality for military as well as civilian security applications.

Bisbee, T.L.

1997-06-01T23:59:59.000Z

198

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

DELIVERY & ENERGY RELIABILITY · OE's Response Mission ­ Provide the Department's support to energy OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Electricity ­ Frequency event monitoring #12 OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Petroleum ­ Stocks and storage monitoring #12

Schrijver, Karel

199

A Network-on-Chip Router for Low-Latency and High-Throughput Dimension-Order Routing  

E-Print Network [OSTI]

and darker lines indicate higher link utilization. ...................................................................................... 6 Figure 2.1: A virtual-channel router with 5 VCs per input port ......................................... 8 Figure 2... 5 VCs per port ...... 36 Figure 6.2: Load-latency curves (cycle-level) Uniform Random 6 VCs per port ...... 36 Figure 6.3: Load-latency curves (cycle-level) Uniform Random 7 VCs per port ...... 37 Figure 6.4: Scaling of saturation...

Rasheed, Shalimar

2014-04-24T23:59:59.000Z

200

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Broader source: Energy.gov (indexed) [DOE]

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

202

Security Notice | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

203

Homeland Security Programs | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

204

Security Policy, Guidance & Reports  

Broader source: Energy.gov [DOE]

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

205

Information Security Policy Policy Title Information Security Policy  

E-Print Network [OSTI]

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

206

Dismantlement Fact Sheet | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Fact Sheet | National Nuclear Security Administration Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Dismantlement Fact Sheet Fact Sheet Dismantlement Fact Sheet Feb 11, 2013 The National Nuclear Security Administration is responsible for designing and maintaining a nuclear stockpile that is safe, reliable and effective in

207

Defense Programs | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Programs | National Nuclear Security Administration Programs | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Defense Programs Home > About Us > Our Programs > Defense Programs Defense Programs One of the primary missions of NNSA is to maintain and enhance the safety, security and reliability of the U.S. nuclear weapons stockpile. NNSA,

208

Personal Security Assistance for Secure Internet Commerce  

E-Print Network [OSTI]

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

209

Nuclear weapon reliability evaluation methodology  

SciTech Connect (OSTI)

This document provides an overview of those activities that are normally performed by Sandia National Laboratories to provide nuclear weapon reliability evaluations for the Department of Energy. These reliability evaluations are first provided as a prediction of the attainable stockpile reliability of a proposed weapon design. Stockpile reliability assessments are provided for each weapon type as the weapon is fielded and are continuously updated throughout the weapon stockpile life. The reliability predictions and assessments depend heavily on data from both laboratory simulation and actual flight tests. An important part of the methodology are the opportunities for review that occur throughout the entire process that assure a consistent approach and appropriate use of the data for reliability evaluation purposes.

Wright, D.L. [Sandia National Labs., Albuquerque, NM (United States)

1993-06-01T23:59:59.000Z

210

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

211

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

212

Office of Information Security  

Broader source: Energy.gov [DOE]

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

213

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

214

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

215

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

216

Real Time Grid Reliability Management 2005  

SciTech Connect (OSTI)

The increased need to manage California?s electricity grid in real time is a result of the ongoing transition from a system operated by vertically-integrated utilities serving native loads to one operated by an independent system operator supporting competitive energy markets. During this transition period, the traditional approach to reliability management -- construction of new transmission lines -- has not been pursued due to unresolved issues related to the financing and recovery of transmission project costs. In the absence of investments in new transmission infrastructure, the best strategy for managing reliability is to equip system operators with better real-time information about actual operating margins so that they can better understand and manage the risk of operating closer to the edge. A companion strategy is to address known deficiencies in offline modeling tools that are needed to ground the use of improved real-time tools. This project: (1) developed and conducted first-ever demonstrations of two prototype real-time software tools for voltage security assessment and phasor monitoring; and (2) prepared a scoping study on improving load and generator response models. Additional funding through two separate subsequent work authorizations has already been provided to build upon the work initiated in this project.

Eto, Joe; Eto, Joe; Lesieutre, Bernard; Lewis, Nancy Jo; Parashar, Manu

2008-07-07T23:59:59.000Z

217

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

218

U.S. Department of Energy Office of Electricity Delivery and Energy Reliability  

Broader source: Energy.gov (indexed) [DOE]

Electricity Delivery and Energy Reliability Electricity Delivery and Energy Reliability Infrastructure Security and Energy Restoration INSURANCE AS A RISK MANAGEMENT INSTRUMENT FOR ENERGY INFRASTRUCTURE SECURITY AND RESILIENCE Insurance as a Risk Management Instrument for Energy Infrastructure Security and Resilience U.S. Department of Energy March 2013 Page ii of viii This page intentionally left blank. Insurance as a Risk Management Instrument for Energy Infrastructure Security and Resilience U.S. Department of Energy March 2013 Page iii of viii Preface This study examines key risks that the Nation's critical energy infrastructure is confronting and the ways in which the insurance industry can help manage these risks, including how it identifies, assesses, and manages them and their potential impacts. Today, weather-related

219

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

220

Chapter Three - Pipeline Reliability Assessment  

Science Journals Connector (OSTI)

Abstract Another aspect of pipeline integrity management is the assessment of system reliability over the age of the pipeline. In order to assess the aging effects through the pipes lifetime, a reliability assessment is carried out for the pipeline or its segment. The assessment of the residual stress effect is carried out by evaluating the reliability of new uncorroded pipelines, which are assumed to be free from any flaw. The influence of residual stress parameters, mean, and coefficient of variation are considered in the reliability assessment.

Ramesh Singh

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Reliability Assessment of Distribution Systems.  

E-Print Network [OSTI]

?? A stable and reliable electric power supply system is an inevitable pre-requisite for the technological and economic growth of any nation. Due to this, (more)

Dorji, Tempa

2009-01-01T23:59:59.000Z

222

WhanauSIP : a secure peer-to-peer communications platform  

E-Print Network [OSTI]

This thesis presents a novel mechanism for achieving secure and reliable peer-to-peer communications on the Internet. WhanauSIP merges a Sybil-proof distributed hash table with the session initiation protocol (SIP) to ...

Cheng, Raymond (Raymond Y.)

2010-01-01T23:59:59.000Z

223

Information Security Guide  

E-Print Network [OSTI]

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

224

The design of a reliable reputation system  

E-Print Network [OSTI]

a peer reliability metric based on the distribution ofa higher reliability score. The most reliable distribution,distribution for the Sybil colluder and a sharp drop in its reliability

Swamynathan, Gayatri; Almeroth, Kevin C.; Zhao, Ben Y.

2010-01-01T23:59:59.000Z

225

North American Electric Reliability Corporation Interconnections...  

Broader source: Energy.gov (indexed) [DOE]

Interconnections North American Electric Reliability Corporation Interconnections Map of the North American Electric Reliability Corporation Interconnection showing the Eastern,...

226

NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL: Preliminary Disturbance...  

Broader source: Energy.gov (indexed) [DOE]

NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL: Preliminary Disturbance Report NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL: Preliminary Disturbance Report The following information...

227

Thermoelectric Mechanical Reliability | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Thermoelectric Mechanical Reliability Thermoelectric Mechanical Reliability 2010 DOE Vehicle Technologies and Hydrogen Programs Annual Merit Review and Peer Evaluation Meeting,...

228

Thermoelectric Mechanical Reliability | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Thermoelectric Mechanical Reliability Thermoelectric Mechanical Reliability 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation...

229

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Broader source: Energy.gov (indexed) [DOE]

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

230

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

231

Lemnos Interoperable Security Program  

Broader source: Energy.gov (indexed) [DOE]

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

232

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

233

A Kerberos security architecture for web services based instrumentation grids  

Science Journals Connector (OSTI)

Instrumentation Grids aim at controlling and managing heterogeneous resources & instruments securely, reliably and in near real-time. Within this context, we present a Web Services based Security Architecture that aims at improving security performance maintaining at the same time interoperability with legacy Grid Security Infrastructure (GSI). Our architecture utilizes GSI X.509 Certificates or Proxy Certificates (RFC3820) for the initial authentication of a user. However, it subsequently maps this identity to a Kerberos one and utilizes WS Security Kerberos Token Profile for embedding user credentials within WS exchange mechanisms. It then provides user authorization, thus realizing a complete AAI (Authentication & Authorization Infrastructure). In order to demonstrate and quantify the performance improvement achieved by our approach over a message exchange using X.509 Certificate Token Profile, we present comparative measurements on implementations of the two options. Our results demonstrate that the Kerberos message exchange schema exhibits up to 50% message throughput improvement, under high CPU load on the server.

Athanasios Moralis; Vassiliki Pouli; Symeon Papavassiliou; Vasilis Maglaris

2009-01-01T23:59:59.000Z

234

TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH  

SciTech Connect (OSTI)

The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

Lee, Hsien-Hsin S

2010-05-11T23:59:59.000Z

235

2014 Reliability & Markets Peer Review  

Broader source: Energy.gov [DOE]

The Transmission Reliability R&D Reliability & Markets Peer Review included 15 presentations over 2 days on August 5 - 6, 2014 at Cornell University in Ithaca, NY. Presentations are available through the links. The agenda and list of presentations are available to download.

236

Cyber security analysis testbed : combining real, emulation, and simulation.  

SciTech Connect (OSTI)

Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

2010-07-01T23:59:59.000Z

237

DOE Provides $4.3 Million to Improve Reliability of the U.S. Electric Grid  

Broader source: Energy.gov (indexed) [DOE]

Provides $4.3 Million to Improve Reliability of the U.S. Provides $4.3 Million to Improve Reliability of the U.S. Electric Grid DOE Provides $4.3 Million to Improve Reliability of the U.S. Electric Grid August 21, 2009 - 3:47pm Addthis Innovative Synchrophasor Research Will Provide Better Real-Time Information WASHINGTON, DC - The Department of Energy's Office of Electricity and Energy Reliability today announced that it will provide $4.3 million for four projects that will use innovative synchrophasor research to improve the reliability and efficiency of our Nation's electricity grid. These awards are part of the Department's efforts to modernize the electric grid and enhance the security and reliability of the energy infrastructure. Synchrophasors are high-speed, real-time synchronized measurement devices used to diagnose the health of the electricity grid. With synchrophasor

238

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

239

STATEMENT OF PATRICIA HOFFMAN ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY  

Broader source: Energy.gov (indexed) [DOE]

APPROPRIATIONS SUBCOMMITTEE ON APPROPRIATIONS SUBCOMMITTEE ON ENERGY AND WATER DEVELOPMENT MARCH 27, 2012 Mr. Chairman and Members of the Committee, thank you for the opportunity to appear before you today to discuss the President's Fiscal Year (FY) 2013 budget for the Department of Energy's (DOE) Office of Electricity Delivery and Energy Reliability (OE). It is the mission of this office to lead national efforts to modernize the electricity delivery system, enhance the security and reliability of America's energy infrastructure and

240

NREL: Gearbox Reliability Collaborative - About the Gearbox Reliability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

About the Gearbox Reliability Collaborative About the Gearbox Reliability Collaborative Premature gearbox failures have a significant impact on the cost of wind farm operations. In 2007, NREL initiated the Gearbox Reliability Collaborative (GRC). The project combines field testing, dynamometer testing, analysis, modeling, condition monitoring, development of a failure database, and operations and maintenance research in a multi-pronged approach to determine why wind turbine gearboxes do not always achieve their expected design life-the time period that manufacturers expect them to last. The collaborative of manufacturers, owners, operators, researchers, and consultants focuses on gearbox modeling and testing and the development of a gearbox failure database. Collaborative members also investigate gearbox

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau  

E-Print Network [OSTI]

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau School of Computer Science be reliable, accurate and confidential. To this end, we propose to identify the security threats inherent in the emerging DSRC Wireless Access in Vehicular Environments (WAVE) architecture. We rank the identified threats

Barbeau, Michel

242

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

243

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov (indexed) [DOE]

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

244

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

245

Secure and robust multipath routings for advanced metering infrastructure  

Science Journals Connector (OSTI)

A Smart Grid is the modernization of the electricity grid using communication technology with the prime goals of reducing energy consumption as well as cost increasing reliability and creating new services for all participants. It comprises key components ... Keywords: Advanced Metering Infrastructure, Last-mile access, Multipath routing protocols, Security, Smart grid, Wireless mesh network

Binod Vaidya; Dimitrios Makrakis; Hussein Mouftah

2013-11-01T23:59:59.000Z

246

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

247

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security More Documents &...

248

SECURITY TERMINATION STATEMENT | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

249

Office of Security Operations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

250

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

251

Security and Privacy Notice  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

252

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

253

Security Topic Group  

Broader source: Energy.gov (indexed) [DOE]

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

254

Photovoltaics performance and reliability workshop  

SciTech Connect (OSTI)

This document consists of papers and viewgraphs compiled from the proceedings of a workshop held in September 1992. This workshop was the fifth in a series sponsored by NREL/DOE under the general subject areas of photovoltaic module testing and reliability. PV manufacturers, DOE laboratories, electric utilities and others exchanged technical knowledge and field experience. The topics of cell and module characterization, module and system performance, materials and module durability/reliability research, solar radiation, and applications are discussed.

Mrig, L. (ed.) [ed.

1992-01-01T23:59:59.000Z

255

Operational Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

256

US, UK, Kazakhstan Secure Radiological Transportation Vehicles...  

National Nuclear Security Administration (NNSA)

place them in secure storage, and improve radiological transportation security and site security. The United Kingdom-funded projects provide an immediate security and safety...

257

College of Safety & Security | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety & Security College of Safety & Security College of Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS)...

258

Office of Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and...

259

Safeguards and Security Program - DOE Directives, Delegations...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

260

Office of Security Enforcement | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

262

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

263

Industrial and Grid Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

264

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

265

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

266

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

267

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

268

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

269

Cloud Operations Excellence & Reliability Page 1 Excellence &  

E-Print Network [OSTI]

and our sites secure from attack, while protecting the privacy of personally identifiable information

Chaudhuri, Surajit

270

2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

271

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

272

Cyber security in the Smart Grid: Survey and challenges  

Science Journals Connector (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distributed intelligence and demand response. Along with the silent features of the Smart Grid, cyber security emerges to be a critical issue because millions of electronic devices are inter-connected via communication networks throughout critical power facilities, which has an immediate impact on reliability of such a widespread infrastructure. In this paper, we present a comprehensive survey of cyber security issues for the Smart Grid. Specifically, we focus on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid. We aim to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security.

Wenye Wang; Zhuo Lu

2013-01-01T23:59:59.000Z

273

On-Chip Copper-Based vs. Optical Interconnects: Delay Uncertainty, Latency, Power, and Bandwidth Density Comparative Predictions  

E-Print Network [OSTI]

On-Chip Copper-Based vs. Optical Interconnects: Delay Uncertainty, Latency, Power, and Bandwidth. Albonesi, Philippe M. Fauchet, and Eby G. Friedman Department of Electrical and Computer Engineering of Rochester, Rochester, New York, 14627 Department of Electrical and Computer Engineering,Cornell University

Friedman, Eby G.

274

IEEE COMMUNICATIONS LETTERS, ACCEPTED FOR PUBLICATION 1 Reliability Analysis of Wireless Sensor Networks with  

E-Print Network [OSTI]

IEEE COMMUNICATIONS LETTERS, ACCEPTED FOR PUBLICATION 1 Reliability Analysis of Wireless Sensor that energy conservation is crucial in sensor node (SN) design to prolong the WSN lifetime. A WSN and correctness proof. Performance issues, especially in energy conservation to best tradeoff security failure

Chen, Ing-Ray

275

Energy Department Invests Over $10 Million to Improve Grid Reliability and Resiliency  

Broader source: Energy.gov [DOE]

As part of the Obama Administrations commitment to a strong and secure power grid, the Energy Department today announced more than $10 million for projects that will improve the reliability and resiliency of the U.S. electric grid and facilitate quick and effective response to grid conditions.

276

PSH-13-0057 - In the Matter of Personnel Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7 - In the Matter of Personnel Security 7 - In the Matter of Personnel Security PSH-13-0057 - In the Matter of Personnel Security On August 28, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance because the individual had been diagnosed with alcohol dependence, opioid abuse, and major depression. His behavior-taking as many as 12 hydrocodone pills with 18 to 24 beers on weekend days to cope with his depression-raised security concerns under Criteria H (mental conditions that cause or may cause a significant defect in judgment or reliability), J (alcohol dependence) and K (misuse of a controlled substance), as well as raising the concern that he was an unlawful user of

277

PSH-12-0058 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

58 - In the Matter of Personnel Security Hearing 58 - In the Matter of Personnel Security Hearing PSH-12-0058 - In the Matter of Personnel Security Hearing The individual is employed by a DOE contractor in a position that requires him to hold a DOE security clearance. For more than seven years, the individual has experienced financial difficulties, which resulted in the Local Security Office (LSO) conducting three personnel security interviews with him. In March 2012, the LSO sent a letter (Notification Letter) to the individual advising him that it possessed reliable information that created a substantial doubt regarding his eligibility to hold a security clearance. In an attachment to the Notification Letter, the LSO explained that the derogatory information fell within the purview of one potentially

278

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

279

Reliability and Functional Availability of HVAC Systems  

E-Print Network [OSTI]

This paper presents a model to calculate the reliability and availability of heating, ventilation and air conditioning systems. The reliability is expressed in the terms of reliability, maintainability and decision capability. These terms are a...

Myrefelt, S.

2004-01-01T23:59:59.000Z

280

Constructing Reliable Distributed Communication Systems with CORBA  

E-Print Network [OSTI]

Constructing Reliable Distributed Communication Systems with CORBA Silvano Maffeis Douglas C Communication software and distributed services for next- generation applications must be reliable, efficient model to support reliable data- and process- oriented distributed systems that communicate through syn

Schmidt, Douglas C.

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Security Assistance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

282

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

283

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

284

Secure video communications system  

DOE Patents [OSTI]

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

285

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

286

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

287

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

288

ORISE 04-0115 Human Reliability Program Medical Assessments 2004  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ORISE 04-0115 ORISE 04-0115 Office of Security U. S. Department of Energy Human Reliability Program MEDICAL ASSESSMENTS Center for Human Reliability Studies Oak Ridge Institute for Science and Education Operated by Oak Ridge Associated Universities For the U. S. Department of Energy Oak Ridge Associated Universities (ORAU) is a university consortium leveraging the scientific strength of major research institutions to advance science and education by partnering with national laboratories, government agencies, and private industry. ORAU manages the Oak Ridge Institute for Science and Education for the U.S. Department of Energy (DOE). Oak Ridge Institute for Science and Education (ORISE) is a DOE facility focusing on scientific initiatives to research health risks from occupational hazards, assess environmental cleanup, respond to radiation medical

289

Security in Service?oriented Grid  

Science Journals Connector (OSTI)

Service?oriented architecture (SOA) is the most common used approach for building architectural decisions of a system. SOA is an architectural model for developing reliable distributed systems which functionality is provided as services. Features from this approach are services interoperability loose?coupling reusability and discoverability. Grid is a new technology for using computers network and devices. The Grid is infrastructure for coordinate use of distributed resources shared by different institutes computational centers and organizations. Grid is dynamic and heterogeneous system beyond any institutional or organization boundaries. Considering this the development and integration of Gird application in such dynamic and heterogeneous environment is a great challenge. Something more developing of Grid application is still tightly related with the underlying middleware and its security. Service?oriented Grids are one step further in integration of Grid application because of the SOA features. These benefits from Grid and SOA however will require and new security approaches for building application. In this article we will briefly describe some known security approaches in SOA and Grid and how they are applied in security models of two well known service?oriented grid architecturesOGSA and EGA.

R. Goranova

2008-01-01T23:59:59.000Z

290

PRIVACY/SECURITY NOTICE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

291

Securing Control Systems Modems  

Broader source: Energy.gov (indexed) [DOE]

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

292

National Center for Nuclear Security - NCNS  

ScienceCinema (OSTI)

As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

None

2015-01-09T23:59:59.000Z

293

National Center for Nuclear Security - NCNS  

SciTech Connect (OSTI)

As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

None

2014-11-12T23:59:59.000Z

294

PSH-12-0016 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

6 - In the Matter of Personnel Security Hearing 6 - In the Matter of Personnel Security Hearing PSH-12-0016 - In the Matter of Personnel Security Hearing The administrative review proceeding began with the issuance of a Notification Letter to the Individual. See 10 C.F.R. § 710.21. The letter informed the Individual that information in the possession of the DOE created a substantial doubt concerning his eligibility for a security clearance. Specifically, the Local Security Office (LSO) stated that the Individual had: (1) been diagnosed by a psychologist as suffering from Impulse-Control Disorder, an illness or mental condition of a nature which causes, or may cause, a significant defect in judgment or reliability; and (2) engaged in unusual conduct which brought his honesty, trustworthiness, and reliability into question by viewing pornography at work, providing

295

Smart Grid Investments Improve Grid Reliability, Resilience,...  

Energy Savers [EERE]

Investments Improve Grid Reliability, Resilience, and Storm Responses (November 2014) Smart Grid Investments Improve Grid Reliability, Resilience, and Storm Responses (November...

296

Electricity & Energy Reliability (WFP) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Electricity & Energy Reliability (WFP) Electricity & Energy Reliability (WFP) The purpose of the workforce Plan is to provide focus and direction to Human Resources (HR) strategy....

297

ELECTRICITY DELIVERY AND ENERGY RELIABILITY Appropriation Overview  

Broader source: Energy.gov (indexed) [DOE]

ELECTRICITY DELIVERY AND ENERGY RELIABILITY Appropriation Overview Electricity Delivery and Energy Reliability (OE) drives electric grid modernization and resiliency in the energy...

298

Thermoelectric Mechanical Reliability | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Mechanical Reliability Thermoelectric Mechanical Reliability 2012 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation...

299

Thermoelectric Materials By Design: Mechanical Reliability (Agreement...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Materials By Design: Mechanical Reliability (Agreement 14957) Thermoelectric Materials By Design: Mechanical Reliability (Agreement 14957) Presentation from the U.S. DOE Office of...

300

Office of Security Operations: Headquarters Security Officers (HSO) Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Detecting and Mitigating Security Risks  

E-Print Network [OSTI]

______________________________________________________________________________________________________ 2 Introduction IT security threats are multiplying quickly. One reason is that sophisticated hacking. Second, while hacking once largely constituted an intellectual exercise for security enthusiasts, hacking

Fisher, Kathleen

302

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

303

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

304

January 2007 SECURITY CONTROLS FOR  

E-Print Network [OSTI]

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

305

Headquarters Facilities Master Security Plan  

Office of Environmental Management (EM)

Chapter 10-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Title 32, CFR, Part 2001,...

306

Security and Privacy Notices | NREL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

307

Security Suites | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

308

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SNL SECURITY CONTACTS SNLNM Contacts SNLCA Contacts Function Contact Email Telephone Badge Office 505-284-3626 - Escorting security@sandia.gov 505-845-1321 Classification...

309

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

310

Energy Security Planning for Sustainable Buildings | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Program Areas » Sustainable Buildings & Campuses » Energy Program Areas » Sustainable Buildings & Campuses » Energy Security Planning for Sustainable Buildings Energy Security Planning for Sustainable Buildings October 4, 2013 - 4:56pm Addthis For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities

311

Federal Energy Management Program: Energy Security Planning for Sustainable  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Planning for Sustainable Buildings Security Planning for Sustainable Buildings For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities are sufficient to serve their most critical needs during a prolonged outage.

312

Technology Applications Center | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technology Applications Technology Applications ... Technology Applications Center The Y-12 Technology Applications Center, established with more than 20 years of testing and evaluation experience at the Y-12 National Security Complex, provides a dedicated resource to technology providers and groups procuring security technologies. Y-12 TAC helps determine a security technology's value by testing in real-world settings. As an unbiased and independent organization, Y-12 TAC provides a qualitative look at the technology's performance and answers the tough question: "Will the system work effectively when needed?" Our customers can reliably draw upon on Y-12's extensive experience with and expertise in many current security technologies. Both the technology provider and the technology buyer derive significant

313

July 24, 2009, Visiting Speakers Program - Regulation and High Reliability Organizations by Dr. Jerry Ellig  

Broader source: Energy.gov (indexed) [DOE]

and High Reliability and High Reliability Organizations Jerry Ellig Senior Research Fellow Prepared for the U.S. Department of Energy Office of Health, Safety, and Security Visiting Speakers Program National Academy of Public Administration July 24, 2009 High Reliability Organizations � "Avoid catastrophes in high-risk, complex operating environments ... consistently deliver year-in/year-out high value and high performance regardless of their operating environment." � Key principle: Reality isn't optional. Some examples � Airline and airport security � Electricity � Telecommunications � Finance and banking � Direct wine shipment (OK, maybe not an HRO, but it's a fun and illustrative story) Four suggestions 1. Base decisions on evidence of outcomes 2.

314

Electronic reliability estimation: how reliable are the results?  

Science Journals Connector (OSTI)

The development of Safety Critical Systems requires the compliance to several safety standards and regulations. Since, most of the times, human life is at stake, it is crucial to fully understand the behaviour of the system being developed in order to ... Keywords: MIL-Hdbk-217F, MTTF, estimation, reliability

Nuno Silva; Rui Lopes

2012-09-01T23:59:59.000Z

315

Electricity market deregulation and energy security: a study of the UK and Singapore electricity markets  

Science Journals Connector (OSTI)

This study seeks to examine whether deregulated electricity markets can provide energy security. Conceptualising energy security as that of having adequate, reliable and reasonably priced energy, this study proposes a set of indicators that can serve as an approximate gauge to determine whether a particular electricity market is robust enough to provide energy security. These chosen indicators are applied for both the UK and Singapore electricity markets in particular, and the outcomes provide evidence to believe that both markets are capable of providing energy security.

Youngho Chang; Jian Liang Lee

2008-01-01T23:59:59.000Z

316

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols  

E-Print Network [OSTI]

In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Horace P. Yuen

2014-05-07T23:59:59.000Z

317

Privacy/Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

318

Producing reliable software: an experiment  

Science Journals Connector (OSTI)

A customer of high assurance software recently sponsored a software engineering experiment in which a small real-time software system was developed concurrently by two popular software development methodologies. One company specialized in the state-of-the-practice ... Keywords: capability maturity model, cleanroom certification, formal methods, software development methodologies, software engineering experiment, software process and product metrics, software reliability

Carol Smidts; Xin Huang; James C. Widmaier

2002-04-01T23:59:59.000Z

319

National Security Information Systems (NSIS) -National Security Systems &  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

320

2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

322

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

323

Reliability-based optimization using evolutionary algorithms  

Science Journals Connector (OSTI)

Uncertainties in design variables and problem parameters are often inevitable and must be considered in an optimization task if reliable optimal solutions are sought. Besides a number of sampling techniques, there exist several mathematical approximations ... Keywords: Ditlevsen's bound, Pareto-optimal front, evolutionary multiobjective optimization, most probable point, reliability-based optimization, reliable front, system reliability

Kalyanmoy Deb; Shubham Gupta; David Daum; Jrgen Branke; Abhishek Kumar Mall; Dhanesh Padmanabhan

2009-10-01T23:59:59.000Z

324

Office of Headquarters Security Operations | Department of Energy  

Office of Environmental Management (EM)

Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting...

325

Reliability and Markets Program Information | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Reliability and Markets Program Information Reliability and Markets Program Information Summary of the Tranmission Reliability program's Reliability and Markets activity area. The...

326

Headquarters Security Quick Reference Book  

Broader source: Energy.gov [DOE]

This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

327

November 2003 NETWORK SECURITY TESTING  

E-Print Network [OSTI]

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

328

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

329

National Security, Weapons Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

330

Requirements for security signalling  

SciTech Connect (OSTI)

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

331

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, cancels DOE O 470.4B.

2011-07-21T23:59:59.000Z

332

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

333

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

334

Energy Security Through Hydrogen  

Science Journals Connector (OSTI)

Energy and environmental security are major problems facing our global economy. Fossil fuels, particularly crude oil, are ... energy sources. In the long term, a hydrogen-based economy will have an impact on all ...

Professor John W. Sheffield

2007-01-01T23:59:59.000Z

335

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

336

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

337

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

338

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

339

Nuclear Energy & Energy Security  

Science Journals Connector (OSTI)

Safety issues related to use of nuclear energy and secure operation of nuclear installations are mail stones of great importance. Although none of technologies producing energy are absolutely safe it is obvious t...

Jumber Mamasakhlisi

2010-01-01T23:59:59.000Z

340

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Principal Associate Director - Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

342

Nevada National Security Site - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

343

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

344

Framework for SCADA Security Policy  

Broader source: Energy.gov (indexed) [DOE]

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

345

Incidents of Security Concern  

Broader source: Energy.gov (indexed) [DOE]

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

346

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

347

Security systems engineering overview  

SciTech Connect (OSTI)

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

348

Argonne Team Challenges Physical Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

349

PSH-13-0074 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-13-0074 - In the Matter of Personnel Security Hearing Personnel Security Hearing (PSH-13-0074). On September 19, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should restore an individual's access authorization. As a security concern under 10 C.F.R. Part 710, a Local Security Office cited the report of the DOE psychologist, in which he concluded that the individual met criteria found in the Diagnostic and Statistical Manual of Mental Disorders IV-TR (DSM-IV-TR) for Opioid Dependence, and that this condition causes, or may cause, a significant defect in judgment and reliability. In accord with the hearing testimony of the DOE psychologist, the Hearing Officer found that there was a low risk that the individual's condition would, in

350

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

351

PSH-13-0038 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

8 - In the Matter of Personnel Security Hearing 8 - In the Matter of Personnel Security Hearing PSH-13-0038 - In the Matter of Personnel Security Hearing On June 26, 2013, an OHA Hearing Officer issued a Decision in which she determined that an Individual's access authorization should not be granted. In reaching this determination, the Hearing Officer found that the Individual had not resolved the security concerns arising from an opinion of a licensed medical professional that he has a mental condition which causes or may cause a significant defect in judgment and reliability and the Individual's past unreliable behavior. A DOE psychologist opined that the Individual has a mental trait that makes him unreliable. The Local Security Office (LSO) raised the DOE psychologist's opinion as a security concern under Criterion H of the Part 710 regulations. The LSO

352

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Broader source: Energy.gov (indexed) [DOE]

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

353

EIS-0387: Y-12 National Security Complex Site-Wide Environmental Impact  

Broader source: Energy.gov (indexed) [DOE]

87: Y-12 National Security Complex Site-Wide Environmental 87: Y-12 National Security Complex Site-Wide Environmental Impact Statement, Oak Ridge, Tennessee EIS-0387: Y-12 National Security Complex Site-Wide Environmental Impact Statement, Oak Ridge, Tennessee Overview NNSA, a separately organized agency within DOE, is responsible for maintaining the safety, reliability, and security of the U.S. nuclear weapons stockpile to meet national security requirements. NNSA manages nuclear weapons programs and facilities, including those at the Y-12 National Security Complex (Y-12) at Oak Ridge, Tennessee. This Final Y-12 SWEIS analyzed the potential environmental impacts of the reasonable alternatives for ongoing and foreseeable future operations and activities at Y-12, including alternatives for changes to site infrastructure and

354

PSH-12-0042 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

42 - In the Matter of Personnel Security Hearing 42 - In the Matter of Personnel Security Hearing PSH-12-0042 - In the Matter of Personnel Security Hearing This case involves an Individual who failed to meet his financial obligations during the final years of his first marriage. The Individual reported the repossession of his motor vehicle and a home foreclosure to the Local Security Office (LSO) in 2008. The LSO subsequently conducted a series of three Personal Security Interviews (PSI) of the Individual, the most recent on February 1, 2012. Unable to resolve the security concerns raised by the Individual's failure to resolve his financial issues, the LSO initiated administrative review proceedings by issuing a letter (Notification Letter) advising the Individual that it possessed reliable information that created a substantial doubt regarding his eligibility to

355

LAMPF reliability history and program  

Science Journals Connector (OSTI)

Many years of service of the 800?MeV LAMPF H+/H? linac offers the opportunity to evaluate the long?term reliability characteristics of a high?power machine which with up to 800?kW beam power available is as close to an ADTT machine as exists in the world today. Records from the last 15 years of operation were analyzed for trends and areas of deteriorating reliability or disproportionate downtime and used to support engineering judgment on facility refurbishment to regain beam availability. This round of analysis has helped define a further level of detail and automation to be implemented in availability recording. Interesting features which emerge from the history include a clear measurement of the lower availability in the first operating cycle following extended maintenance periods and a consistent picture of the highest availability to be expected in extended operating periods with the facility as used and maintained. The results provide a starting point for informed discussion of reliability goals.

Olin van Dyck

1995-01-01T23:59:59.000Z

356

Development of a sex difference in the preferred latency response in the weakly electric fish, Pollimyrus isidori (Cuvier et Valenciennes) (Mormyridae, Teleostei)  

Science Journals Connector (OSTI)

Pollimyrus isidori...displays two types of electric organ discharge (EOD) phase-locking behaviours with EODs of other ... latency response (PLR) maintains preference of an EOD interval of...

Hubert Lcker; Bernd Kramer

1981-09-01T23:59:59.000Z

357

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

358

Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration  

Broader source: Energy.gov (indexed) [DOE]

Year-in-Review: 2010 Year-in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S. Department of Energy August 2011 OE/ISER Report 8/31/11 i For Further Information This report was prepared by the Office of Electricity Delivery and Energy Reliability under the direction of Patricia Hoffman, Assistant Secretary, and William Bryan, Deputy Assistant Secretary. Specific questions about information in this report may be directed to Alice Lippert, Senior Technical Advisor (alice.lippert@hq.doe.gov). Contributors include Mindi Farber-DeAnda, Robert Laramey, Carleen Lewandowski, Max

359

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

360

Reliability-Centered Maintenance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Reliability-Centered Maintenance Reliability-Centered Maintenance Reliability-Centered Maintenance October 7, 2013 - 9:48am Addthis Reliability-centered maintenance leverages the same practices and technologies of predictive maintenance. The difference is that reliability-centered maintenance recognizes that: Equipment design and operations differ Different equipment has different probabilities of failure All equipment is not of equal importance to facility operations Facilities have limited financial and personnel resources. While reliability-centered maintenance relies on predictive maintenance practices and technologies, it also recognizes that maintenance on inexpensive and/or unimportant equipment may be better served by a reactive or predictive maintenance approach. Each of the aforementioned factors are

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

NREL: Wind Research - Gearbox Reliability Collaborative  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Research Research Search More Search Options Site Map Premature gearbox failures have a significant impact on the cost of wind farm operations. In 2007, NREL initiated the Gearbox Reliability Collaborative (GRC). The project combines analysis, field testing, dynamometer testing, condition monitoring, and the development and population of a gearbox failure database in a multi-pronged approach to determine why many wind turbine gearboxes do not achieve their expected design life-the time period that manufacturers expect them to last. Read about: The Gearbox Reliability Collaborative Gearbox Reliability Collaborative Projects Gearbox Reliability Collaborative Research and Development Working with the Gearbox Reliability Collaborative Gearbox Reliability Collaborative Publications

362

Location Based Security for Smart Grid Applications  

Science Journals Connector (OSTI)

Abstract Smart Grid (SG) promises efficient, sustainable, green and reliable electrical delivery by combining the existing electrical distribution network assets with modern information and communications technologies (ICT) in order to transfer information and energy in both directions. Introduction of these intelligent devices will help the grid monitor, protect, and automatically optimise the operation of interconnected elements, in addition to interaction between energy suppliers and consumers. However, this exposes the future grid to new security challenges and risks. In this paper, a framework for protecting Smart Grid applications using geographic location of the devices connected to it is proposed. With this framework, each device on the grid adds an extra layer of security. The proposed scheme is not application or device specific which means it can be implemented on any communication node on the grid. The scheme uses an algebraic code based cryptosystems known as GPT (Gabidulin -Paramonov-Trejtakov), which provides a very strong protection while utilising the smallest key size as compared to other cryptosystems based on algebraic codes. As with other code based cryptosystems, the proposed security framework protects grid information against cyber threats as well as against channel impairments in the form of error protection codes.

Eraj Khan; Bamidele Adebisi; Bahram Honary

2013-01-01T23:59:59.000Z

363

Energy, Climate & Infrastructure Security  

E-Print Network [OSTI]

-depthasneeded,withcontent ranging from Level 1 - 3 PRA and Fire PRA, to human reliability analysis, human factors for courses on nuclear reactor safety and Sandia-developed computational codes, used to model and simulate

364

Tag: GTRI | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

365

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

366

April 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

367

Sandia National Laboratories: Water Security Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Water Security Program Water Security CustomersPartners Awards Key Publications Staff Biographies Water Security In many areas of the United States and multiple regions of...

368

Integrated safeguards and security management plan  

E-Print Network [OSTI]

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

369

Sandia National Laboratories: National Security Missions: Internationa...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security casks We reduce proliferation and terrorism threats to U.S. national security through global technical engagement. Enhance security of vulnerable nuclear weapons...

370

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network [OSTI]

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

371

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES Form is used to document travel to sensitive countries. SECURITY...

372

Security, Emergency Planning & Safety Records | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

373

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

374

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

375

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

376

Cyber Security Issues and Requirements  

Broader source: Energy.gov (indexed) [DOE]

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

377

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

378

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

379

Security Clearances; Limitations  

Broader source: Energy.gov (indexed) [DOE]

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

380

New Security Challenges in the Global Era: Environmental Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

The security fallacy: Seven myths about physical security | Argonne  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

382

Security Science: The Theory and Practice of Security  

Science Journals Connector (OSTI)

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners ...

Clifton Smith; David J Brooks

2012-12-01T23:59:59.000Z

383

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

384

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

385

Modelling in industrial maintenance and reliability  

Science Journals Connector (OSTI)

......of modelling the reliability of wind turbines and some critical subsystems from...change, through the years, in wind turbines reliability. There were major...research on determining optimal maintenance policies for deteriorating systems......

Wenbin Wang

2010-10-01T23:59:59.000Z

386

Reliability analysis reloaded: how will we survive?  

Science Journals Connector (OSTI)

In safety related applications and in products with long lifetimes reliability is a must. Moreover, facing future technology nodes of integrated circuit device level reliability may decrease, i.e., counter-measures have to be taken to ensure product ...

Robert Aitken; Grschwin Fey; Zbigniew T. Kalbarczyk; Frank Reichenbach; Matteo Sonza Reorda

2013-03-01T23:59:59.000Z

387

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

388

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

389

Engineering secure software  

E-Print Network [OSTI]

Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style... Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style...

Jetly, Prateek

2012-06-07T23:59:59.000Z

390

Quantum-secured imaging  

E-Print Network [OSTI]

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

391

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

392

LUNAR MASS SPECTROMETER RELIABILITY LOGIC DIAGRAM  

E-Print Network [OSTI]

point (A) to (F). The block diagram also defines the reliability functions for the purpose of FMEA 1

Rathbun, Julie A.

393

Wireless Policy, Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

394

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network [OSTI]

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

395

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

396

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

397

Reliability Considerations from Integration of Smart Grid  

Broader source: Energy.gov (indexed) [DOE]

Considerations Considerations from the Integration of Smart Grid 116-390 Village Blvd., Princeton, NJ 08540 609.452.8060 | 609.452.9550 fax www.nerc.com the reliability of the to ensure bulk power system December 2010 (This page intentionally left blank) to ensure the reliability of the bulk power system Reliability Considerations of Integration of Smart Grid i

398

The Whereabouts of Reliability Education: Challenges & Opportunities  

E-Print Network [OSTI]

. There is a gap between reliability theory and practice, between school and industry, book knowledge and real The probability that the system is still operating at time t. where f(t) probability density function h(t) failure changing and getting higher. #12;Some Reliability books in ... 1960s Igor Bazovsky (1961), Reliability

Bernstein, Joseph B.

399

SAFETY AND RELIABILITY ANALYSIS OF NUCLEAR REACTORS  

Science Journals Connector (OSTI)

Abstract A survey of the various aspects of safety and reliability analysis of nuclear reactors is presented with particular emphasis on the interrelation between structural reliability and systems reliability. In reactor design this interrelation is of overriding importance since it is the task of the control, protective and containment systems to protect the mechanical system and the structure from accidental overloading.

T.A. JAEGER

1972-01-01T23:59:59.000Z

400

Bayesian Networks in Reliability Analysis Helge Langseth  

E-Print Network [OSTI]

Bayesian Networks in Reliability Analysis Helge Langseth Dept. Computer and Information Sciences Bayesian network (BN) models gain more and more popularity in reliability analysis. In this talk I reliability measures concerning a low pressure coolant injection system for a nuclear reactor (a problem

Langseth, Helge

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

RELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION  

E-Print Network [OSTI]

RELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION Richard Hardin1 , K.K. Choi1 , and Christoph 52242-1527 Keywords: Casting Process Design, Optimization, Reliability-Based Design Optimization purpose reliability-based design optimization (RBDO) software tool previously developed at the University

Beckermann, Christoph

402

Measuring Improved Reliability in Stochastic Systems  

E-Print Network [OSTI]

for such a path, this represents a better measure of the path's reliability. If the distribution were asymmetricMeasuring Improved Reliability in Stochastic Systems Jeremy Bradley \\Lambda Neil Davies y 30 June 1999 Abstract In this paper, we examine reliability of stochastic systems with specific application

Bradley, Jeremy

403

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

404

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

405

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

406

Automated analysis of security APIs  

E-Print Network [OSTI]

Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, ...

Lin, Amerson H

2005-01-01T23:59:59.000Z

407

Access Authorization: Defining Significant Defects in Judgement or Reliability (ORISE 05-0258, 2005)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security U. S. Department of Energy Center for Human Reliability Studies Oak Ridge Institute for Science and Education Operated by Oak Ridge Associated Universities for the U. S. Department of Energy Access Authorization: Defining Significant Defects in Judgment or Reliability ORISE 05-0258 Oak Ridge Associated Universities (ORAU) is a university consortium leveraging the scientific strength of major research institutions to advance science and education by partnering with national laboratories, government agencies, and private industry. ORAU manages the Oak Ridge Institute for Science and Education for the U.S. Department of Energy (DOE). Oak Ridge Institute for Science and Education (ORISE) is a DOE facility focusing on scientific initiatives to research

408

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network [OSTI]

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

409

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

410

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

411

About SRNL - Directorates - National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Technical Partnerships Global...

412

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

413

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

414

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

415

Transmission Line Security Monitor  

SciTech Connect (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2011-01-01T23:59:59.000Z

416

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

417

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

418

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

419

Model checking grid security  

Science Journals Connector (OSTI)

Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a cutoff theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.

F. Pagliarecci; L. Spalazzi; F. Spegni

2013-01-01T23:59:59.000Z

420

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

422

Mac Security Bible  

Science Journals Connector (OSTI)

Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely ...

Joe Kissell

2010-01-01T23:59:59.000Z

423

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

424

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

425

Study Shows Active Power Controls from Wind May Increase Revenues and Improve System Reliability  

Broader source: Energy.gov [DOE]

The DOE Wind Program and the National Renewable Energy Laboratory recently published a study conducted in collaboration with the Electric Power Research Institute and the University of Colorado. Researchers examined how the contribution of wind power providing active power controls could benefit the total power system economics, increase revenue streams, and improve the reliability and security of the nations power system, all while having negligible impacts on the turbine and its components.

426

Human Reliability Program 10 CFR, part 712 Subpart B Medical Standards  

Broader source: Energy.gov [DOE]

HRP Policy is the responsibility of the Office of Departmental Personnel Security Policy (HS-1.4). The Office of Worker Safety and Health Assistance (HS-12), has responsibility within the DOE Human Reliability Programs (HRP) to ensure appropriate policies and procedures are in place and used at HQ and the DOE sites to monitor HRP-designated worker's health and fitness-for-duty.

427

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Research Areas Fuel Cycle Science & Technology Fusion Nuclear Science Isotope Development and Production Nuclear Security Science & Technology Border Security Comprehensive...

428

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

429

Security Control Assessor | Department of Energy  

Energy Savers [EERE]

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

430

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

431

Software reliability models for critical applications  

SciTech Connect (OSTI)

This report presents the results of the first phase of the ongoing EG&G Idaho, Inc. Software Reliability Research Program. The program is studying the existing software reliability models and proposes a state-of-the-art software reliability model that is relevant to the nuclear reactor control environment. This report consists of three parts: (1) summaries of the literature review of existing software reliability and fault tolerant software reliability models and their related issues, (2) proposed technique for software reliability enhancement, and (3) general discussion and future research. The development of this proposed state-of-the-art software reliability model will be performed in the second place. 407 refs., 4 figs., 2 tabs.

Pham, H.; Pham, M.

1991-12-01T23:59:59.000Z

432

Software reliability models for critical applications  

SciTech Connect (OSTI)

This report presents the results of the first phase of the ongoing EG G Idaho, Inc. Software Reliability Research Program. The program is studying the existing software reliability models and proposes a state-of-the-art software reliability model that is relevant to the nuclear reactor control environment. This report consists of three parts: (1) summaries of the literature review of existing software reliability and fault tolerant software reliability models and their related issues, (2) proposed technique for software reliability enhancement, and (3) general discussion and future research. The development of this proposed state-of-the-art software reliability model will be performed in the second place. 407 refs., 4 figs., 2 tabs.

Pham, H.; Pham, M.

1991-12-01T23:59:59.000Z

433

Definition: Reliability Coordinator Information System | Open Energy  

Open Energy Info (EERE)

Reliability Coordinator Information System Reliability Coordinator Information System Jump to: navigation, search Dictionary.png Reliability Coordinator Information System The system that Reliability Coordinators use to post messages and share operating information in real time.[1] Related Terms Reliability Coordinator References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Reliability_Coordinator_Information_System&oldid=480407" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version Permanent link Browse properties 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load)

434

IEEE TRANSACTIONS ON RELIABILITY, VOL. 38, NO. 1,1989 APRIL 103 Reliable Protocols for Distributed  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON RELIABILITY, VOL. 38, NO. 1,1989 APRIL 103 Reliable Protocols for Distributed-tolerance, Message complexity, Reliable protocol Reader Aids - Purpose: Design reliable distributed protocols Special Termination Detection S. Venkatesan University of Pittsburgh, Pittsburgh Key Words - Distributed system, Fault

Venkatesan, S.

435

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

436

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

437

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Journals Connector (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

438

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

439

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

440

Headquarters Facilities Master Security Plan  

Broader source: Energy.gov [DOE]

The purpose of the Headquarters Facilities Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures in place at Department of Energy (DOE) Headquarters (HQ) facilities in the Washington, DC area. The HQFMSP does not establish new security requirements; security requirements are established by various Federal laws and regulations, Executive Orders, and DOE directives. This plan explains how these requirements are implemented at HQ and gives HQ personnel and visitors access to the security policies and procedures that affect them regularly. The HQFMSP does not apply to DOE sites or facilities outside the Washington, DC area.

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

PSH-13-0016 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

6 - In the Matter of Personnel Security Hearing 6 - In the Matter of Personnel Security Hearing PSH-13-0016 - In the Matter of Personnel Security Hearing On June 20, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following an anonymous report, the Human Reliability Program at the individual's site investigated a report that the individual had been found incoherent and naked at a local convenience store one morning at 2am by one of his co-workers. During this investigation, the individual's HRP certification was suspended. As the investigation was being completed, the individual's access authorization came due for a periodic re-investigation. During that investigation, the individual reported higher alcohol consumption than he had during the earlier Personnel Security

442

PSH-13-0107 - In the Matter of Personnel Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7 - In the Matter of Personnel Security 7 - In the Matter of Personnel Security PSH-13-0107 - In the Matter of Personnel Security On November 29, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) cited concerns raised by the individual's use of alcohol habitually to excess and an opinion by a DOE consultant psychologist (DOE psychologist) that the individual's excessive use of alcohol was an illness or mental conditions that causes or may cause a significant defect in judgment and reliability. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate these security concerns. The individual

443

PSH-13-0006 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

PSH-13-0006 - In the Matter of Personnel Security Hearing PSH-13-0006 - In the Matter of Personnel Security Hearing PSH-13-0006 - In the Matter of Personnel Security Hearing DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's history of criminal conduct, financial problems, and past use of alcohol habitually to excess. The LSO also cited the report of a DOE Psychologist, in which he identified the individual's lack of control over his spending and use of alcohol as a mental condition that causes a significant defect in his judgment and reliability. The Hearing Officer found that (1) the individual had not resolved the concerns raised by his problematic use of alcohol, as he had received no treatment in the six

444

PSH-13-0006 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

6 - In the Matter of Personnel Security Hearing 6 - In the Matter of Personnel Security Hearing PSH-13-0006 - In the Matter of Personnel Security Hearing DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's history of criminal conduct, financial problems, and past use of alcohol habitually to excess. The LSO also cited the report of a DOE Psychologist, in which he identified the individual's lack of control over his spending and use of alcohol as a mental condition that causes a significant defect in his judgment and reliability. The Hearing Officer found that (1) the individual had not resolved the concerns raised by his problematic use of alcohol, as he had received no treatment in the six months since being arrested for DWI, and had previously relapsed after

445

PSH-13-0037 - In the Matter of Personnel Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7 - In the Matter of Personnel Security 7 - In the Matter of Personnel Security PSH-13-0037 - In the Matter of Personnel Security On July 25, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office began an investigation of an individual's eligibility for access authorization after the individual was arrested for "public nuisance," having fallen asleep along the side of a building while intoxicated and partially undressed. The DOE consulting psychologist evaluated the individual and concluded that although he did not meet any DSM-IV-TR classification for alcohol disorders, he was a user of alcohol habitually to excess which is a condition that causes or could cause significant defects in his judgment and reliability. The LSO

446

TSO-1111 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

11 - In the Matter of Personnel Security Hearing 11 - In the Matter of Personnel Security Hearing TSO-1111 - In the Matter of Personnel Security Hearing The administrative review proceeding began with the issuance of a Notification Letter to the Individual. See 10 C.F.R. § 710.21. The letter informed the Individual that information in the possession of the DOE created a substantial doubt concerning his eligibility for a security clearance. Specifically, the Local Security Office (LSO) characterized this information as indicating that the Individual had engaged in unusual conduct which brought his honesty, trustworthiness, and reliability into question, and had been found by a psychologist to meet the criteria for alcohol abuse set forth in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (Text

447

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

October 11, 2012 October 11, 2012 PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer fo October 2, 2012 PSH-12-0052 - In the Matter of Personnel Security Hearing On October 2, 2012, an OHA Hearing Officer issued a decision in which he

448

Chapter_14_Cyber_Security  

Broader source: Energy.gov (indexed) [DOE]

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

449

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

450

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

January 11, 2012 January 11, 2012 TSO-01113 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in July 2011. PSI, DOE Ex. 13 In August 2011, the LSO issued the individual a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance. (DOE Ex. 1). December 21, 2011 TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection

451

Chapter_3_Personnel_Security  

Broader source: Energy.gov (indexed) [DOE]

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

452

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

453

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

454

2014 DOE Human Reliability Program (HRP) Workshop | Department...  

Office of Environmental Management (EM)

DOE Human Reliability Program (HRP) Workshop 2014 DOE Human Reliability Program (HRP) Workshop August 18, 2014 - 7:51am Addthis 2014 DOE Human Reliability Program (HRP) Workshop...

455

Electricity Delivery and Energy Reliability | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Electricity Delivery and Energy Reliability Electricity Delivery and Energy Reliability information about the delivery of electricity and energy reliability Electricity Delivery...

456

Improving Security in the ATLAS PanDA System  

E-Print Network [OSTI]

The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common `grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is fro...

Caballero, J; The ATLAS collaboration; Nilsson, P; Stewart, G; Potekhin, M; Wenaus, T

2011-01-01T23:59:59.000Z

457

Security, Safety and Health  

Broader source: Energy.gov (indexed) [DOE]

8, Fourth Quarter, 2012 8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest Government Honor in Science & Engineering This September marked a major mile- stone for one of the Office of Fossil Energy's largest carbon capture, utili- zation and storage projects: the opening

458

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

JUNE/JULY 2013 JUNE/JULY 2013 inside this issue ... Reaching the summit - Big hitters talk economic development Page 3 Saving yesterday's knowledge today Page 5 What's a fellow to do? Page 6 ... and other Y-12 news On June 3 newly appointed Secretary of Energy Ernest Moniz (right) made Oak Ridge the site of his first official visit since being sworn in as head of the U.S. Department of Energy. Secretary Moniz met earlier in the day with national lab directors at Oak Ridge National Laboratory, then came to Y-12 for tours and a meeting with the National Nuclear Security Administration Production Office, B&W Y-12 and ORNL employees. He was joined by Rep. Chuck Fleischmann. The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental

459

HEADQUARTERS SECURITY OFFICERS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

HEADQUARTERS SECURITY OFFICERS Revision Date: December 16, 2013 ELEMENT Office of Security Operations AR AR-1 AR-1 AR-1 CF CF-40 CF-40 CI CI-3 ED ED-2 EE EE-3A EE-3A NAME LOCATION PHONE FAX NUMBER WAYNE E. BERKEBILE E-325/GTN 301-903-1163 301-903-8108 Advanced Research Projects Agency - Energy MATTHEW TARDUOGNO L'N !NT 950/Rm. 8014 202-586-2892 202-287-5450 NICHOLE CLAGETT (ALT) L'N !NT 950/Rm. 8025 202-287-6409 202-287-5450 SARA DWYER (REP) L'N !NT 950/Rm. B-2 202-287-6411 202-287-5450 Office of the Chief Financial Officer PHILIP A. KNOPP Rm. 1310 CLV. 301-903-0364 301-903-1863 KIMBERLY J. LUCAS (ALT) Rm. 1310 CLV. 301-903-2485 301-903-6877 Assistant Secretary for Congressional and Intergovernmental Affairs

460

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

The Cyber Security Crisis  

SciTech Connect (OSTI)

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

462

Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security  

SciTech Connect (OSTI)

The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

Electric Power Research

2007-11-01T23:59:59.000Z

463

770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System Design for a Secure  

E-Print Network [OSTI]

Design for a Secure and Reconfigurable Power Grid Hairong Qi, Senior Member, IEEE, Xiaorui Wang, Member architecture design that can help assure the security and reliability of the power grid. In this paper, we770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System

Tolbert, Leon M.

464

National Nuclear Security Administration (NNSA) Operating Principles  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Operating Principles Operating Principles Our wtis.sion is vitcrl ~ r i r l urgent - rue corrstnntly jOcus on missiort outconles. - US nuclear security is the fundamental mission of the NNSA and its laboratories, plants, and test site. - Mission managers bear responsibility for achieving mission outcomes. - Support managers provide technical assistance and support to enable mission delivery. - Our activities reflect a mission-focused, high performing. high reliability enterprise consistently delivering on its commitmerits and addressing national needs. - We constantly strive to drive innovation and reduce barriers to effectively and collaboratively accomplish our mission. Scierrce crnd fecltnology lie crt the hetrrt ?four mission. - The NNSA and its laboratories, plants, and test site are resources to organizations in the US Government

465

Nevada National Security Site Groundwater Program  

ScienceCinema (OSTI)

From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

None

2014-10-28T23:59:59.000Z

466

2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

467

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Italy Nuclear Security Summit: Fact Sheet Fact Sheet Italy Nuclear Security Summit: Fact Sheet Mar 26, 2012 Between the 1960s and mid-1980s, Italy had an ambitious nuclear power

468

Office of Secure Transportation History | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Secure Transportation History Home > About Us > Our Programs > Defense Programs > Office of Secure Transportation > Office of Secure Transportation History Office of Secure Transportation History Since 1947, NNSA and its predecessor agencies have moved nuclear weapons,

469

Reliability Technology earns prestigious Los Alamos Award  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

September 2013 Reliability Technology earns prestigious Los Alamos Award Community Connections: Your link to news and opportunities from Los Alamos National Laboratory Latest...

470

Funding Opportunity Announcement: PHYSICS OF RELIABILITY: EVALUATING...  

Office of Environmental Management (EM)

and development projects that will advance the reliability and durability of solar photovoltaic (PV) technologies. Eligible projects will examine the performance of PV modules and...

471

Substation reliability -- Practical application and system approach  

SciTech Connect (OSTI)

Practical application of reliability analysis was made for the comparison of alternate line and bus arrangements of a future transmission substation with potential savings of up to $3.6 M. The paper describes how both the substation and the power system were simulated by using computer programs STAREL and COMREL. It presents the method used to obtain the most accurate estimates for the outage data of the system components. Finally, it expresses the results with simple reliability indices which can be meaningful for management. The results of the study show the need to include the reliability of the transmission system in a substation reliability evaluation.

Save, P. [Southern California Edison Co., Rosemead, CA (United States)] [Southern California Edison Co., Rosemead, CA (United States)

1995-02-01T23:59:59.000Z

472

Substation reliability -- Practical application and system approach  

SciTech Connect (OSTI)

Practical application of reliability analysis was made for the comparison of alternate line and bus arrangements of a future transmission substation with potential savings of up to 53.6 M. The paper describes how both the substation and the power system were simulated by using computer programs STAREL and COMREL. It presents the method used to obtain the most accurate estimates for the outage data of the system components. Finally, it expresses the results with simple reliability indices which can be meaningful for management. The results of the study show the need to include the reliability of the transmission system in a substation reliability evaluation.

Save, P. [Southern California Edison Co., Rosemead, CA (United States)

1994-12-31T23:59:59.000Z

473

Information Concerning Reliability Impacts under Various System...  

Broader source: Energy.gov (indexed) [DOE]

Impacts under Various System Configurations of the Mirant Potomac River Plant Information Concerning Reliability Impacts under Various System Configurations of the Mirant...

474

Sandia National Laboratories: Third Annual Continuous Reliability...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

analysis of U.S. wind fleet performance based on aggregated fleet reliability data and includes operational statistics, availability time accounting, and top contributors...

475

Reliability evaluation of smart distribution grids.  

E-Print Network [OSTI]

??The term "Smart Grid" generally refers to a power grid equipped with the advanced technologies dedicated for purposes such as reliability improvement, ease of control (more)

Kazemi, Shahram

2011-01-01T23:59:59.000Z

476

Assessment of microelectronics packaging for high temperature, high reliability applications  

SciTech Connect (OSTI)

This report details characterization and development activities in electronic packaging for high temperature applications. This project was conducted through a Department of Energy sponsored Cooperative Research and Development Agreement between Sandia National Laboratories and General Motors. Even though the target application of this collaborative effort is an automotive electronic throttle control system which would be located in the engine compartment, results of this work are directly applicable to Sandia`s national security mission. The component count associated with the throttle control dictates the use of high density packaging not offered by conventional surface mount. An enabling packaging technology was selected and thermal models defined which characterized the thermal and mechanical response of the throttle control module. These models were used to optimize thick film multichip module design, characterize the thermal signatures of the electronic components inside the module, and to determine the temperature field and resulting thermal stresses under conditions that may be encountered during the operational life of the throttle control module. Because the need to use unpackaged devices limits the level of testing that can be performed either at the wafer level or as individual dice, an approach to assure a high level of reliability of the unpackaged components was formulated. Component assembly and interconnect technologies were also evaluated and characterized for high temperature applications. Electrical, mechanical and chemical characterizations of enabling die and component attach technologies were performed. Additionally, studies were conducted to assess the performance and reliability of gold and aluminum wire bonding to thick film conductor inks. Kinetic models were developed and validated to estimate wire bond reliability.

Uribe, F.

1997-04-01T23:59:59.000Z

477

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

478

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

479

Technical article Wiley Handbook of Science and Technology for Homeland Security Article ID: XXXX Page 17  

E-Print Network [OSTI]

of any distributed computing system (DCS) is to offer a flexible, reliable and powerful computingTechnical article Wiley Handbook of Science and Technology for Homeland Security Article ID: XXXX when operated or deployed in harsh or threat-prone environments. For instance, in WSNs deployed

Hayat, Majeed M.

480

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid  

E-Print Network [OSTI]

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid Jin Wei and Deepa stability in the smart grid in the face of cyber-physical attack. We model the smart grid as a networked the proposed framework. I. INTRODUCTION It is well known that the smart grid promises increased reliability

Kundur, Deepa

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

482

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

August 30, 2013 August 30, 2013 PSH-13-0049 - In the Matter of Personnel Security On August 30, 2013, a Hearing Officer issued a Decision in which he determined that an individual's access authorization should not be granted. In reaching this determination, the Hearing Officer found that the individual had not resolved security concerns under Criterion L regarding the Individual's failure to report an arrest for failure to appear at an arraignment concerning traffic tickets and a citation for failing to have a controlled prescription medication in its proper container. August 29, 2013 PSH-13-0057 - In the Matter of Personnel Security On August 28, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security

483

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

August 22, 2012 August 22, 2012 PSH-12-0065 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility. Exhibit (Ex.) 10 at 3. The Local Security Office (LSO) discovered that the Individual failed to list a 2004 Driving Under the Influence (DUI) arrest in a Questionnaire for National Security Positions form completed in October 2011. Ex. 10 at 10. August 22, 2012 PSH-12-0045 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he determined that an Individual's DOE security clearance should be restored. The Individual had been caught viewing pornography on a DOE workplace computer. August 17, 2012 PSH-12-0048 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he concluded that an

484

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

June 20, 2012 June 20, 2012 PSH-12-0044 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility and has possessed a security clearance on various occasions since 1978. Exhibit (Ex.) 8 at 2. In December 2011, the Individual reported to the Local Security Office (LSO) that his wages were being garnished for back federal taxes. Ex. 13 at 1. Consequently, the LSO conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 15. June 13, 2012 PSH-12-0010 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and is an applicant for DOE access authorization. In August 2010, the individual completed a Questionnaire for National Security Positions (QNSP) and was

485

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

14, 2012 14, 2012 PSH-12-0083 - In the Matter of In the Matter of Personnel Security Hearing On November 14, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for failing to comply with rules regarding the handling of classified information and conduct within limited access areas and for failing to report such non-compliance. This behavior raised security concerns under Criteria G and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented su November 13, 2012 PSH-12-0092 - In the Matter of Personnel Security Hearing On September 24, 2012, an OHA Hearing Officer issued a decision in which he

486

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

June 13, 2013 June 13, 2013 PSH-13-0034 - In the Matter of Personnel Security Hearing On June 13, 2013, a Hearing Officer determined that an individual's security clearance should not be restored. In reaching this determination, the Hearing Officer found that the individual had not successfully addressed the DOE's security concerns regarding her finances under criterion (l). June 11, 2013 PSH-13-0019 - In the Matter of Personnel Security On June 11, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's authorization access should be restored. A Local Security Office suspended the individual's security clearance following the individual contemplating suicide and, subsequently, being diagnosed by a DOE consulting psychologist as meeting the criteria for

487

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

488

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Energy Savers [EERE]

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

489

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Broader source: Energy.gov (indexed) [DOE]

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

490

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Broader source: Energy.gov (indexed) [DOE]

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

491

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Broader source: Energy.gov (indexed) [DOE]

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

492

PIA - WEB Physical Security Major Application | Department of...  

Energy Savers [EERE]

Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application More...

493

ETTP Security Access Control System (ESACS) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

494

Security Enforcement Reporting Criteria | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

495

Software Reliability Cases: The Bridge Between Hardware, Software and System Safety and Reliability  

SciTech Connect (OSTI)

High integrity/high consequence systems must be safe and reliable; hence it is only logical that both software safety and software reliability cases should be developed. Risk assessments in safety cases evaluate the severity of the consequences of a hazard and the likelihood of it occurring. The likelihood is directly related to system and software reliability predictions. Software reliability cases, as promoted by SAE JA 1002 and 1003, provide a practical approach to bridge the gap between hardware reliability, software reliability, and system safety and reliability by using a common methodology and information structure. They also facilitate early insight into whether or not a project is on track for meeting stated safety and reliability goals, while facilitating an informed assessment by regulatory and/or contractual authorities.

Herrmann, D.S.; Peercy, D.E.

1999-01-08T23:59:59.000Z

496

Demand Response and Electric Grid Reliability  

E-Print Network [OSTI]

Demand Response and Electric Grid Reliability Paul Wattles Senior Analyst, Market Design & Development, ERCOT CATEE Conference, Galveston October 10, 2012 2 North American Bulk Power Grids CATEE Conference October 10, 2012 ? The ERCOT... adequacy ? ?Achieving more DR participation would . . . displace some generation investments, but would achieve the same level of reliability... ? ?Achieving this ideal requires widespread demand response and market structures that enable loads...

Wattles, P.

2012-01-01T23:59:59.000Z

497

Newsletters | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Newsletters Home > Media Room > Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back

498

Speeches | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

499

Safety and Security Enforcement Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Enforcement Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders / Settlement Agreements Compliance Orders Special Report Orders Enforcement Letters Regulatory Assistance Reviews Enforcement Program and Process Guidance and Information Non-Compliance Tracking System (NTS) Non-Compliance Reporting Thresholds Regulations and Directives Enforcement Staff Enforcement Coordinator Contact Information 2013 DOE Safety and Security Enforcement Workshop Request for Investigation or Inspection of Safety or Security Violations Archived Documents HSS Logo Safety and Security Enforcement Program Office of Enforcement and Oversight What's New: » Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Brookhaven Science Associates, LLC

500

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z