National Library of Energy BETA

Sample records for latency reliability security

  1. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version links between devices in legacy Supervisory Con- trol And Data Acquisition (SCADA) systems, on which security, and yet incurs minimal end-to-end communication latency. Keywords: SCADA network security, bump

  2. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    Smith, Sean W.

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA) systems

  3. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide@cs.dartmouth.edu #12;Contents 1 Introduction 3 1.1 SCADA Systems

  4. Office of Electricity Delivery and Energy Reliability Cyber Security...

    Energy Savers [EERE]

    Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On...

  5. PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY

    E-Print Network [OSTI]

    Smith, Sean W.

    hydro-electric power station consists of a con- trol center on the bank and a substation on the dam secure operations in legacy industrial control networks, such as power grid net- works. Previous it in the Scalable Simu- lation Framework and testing it on Modbus/ASCII protocol, which is widely used in the power

  6. ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR

    SciTech Connect (OSTI)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-08-03

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data transmission in place of NSA Type 1 devices.

  7. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University networks and data products. But as technology becomes more complex, security threats also become more

  8. Secure and reliable operation of our

    E-Print Network [OSTI]

    Amin, S. Massoud

    the weather. Electric power systems constitute the fundamental infrastructure of modern society. A suc attack intended to bring down an entire regional grid. Similarly, the attack could target electricity to national and international economy, security, and quality of life. Massoud Amin, Electric Power Research

  9. The Ambient Computational Environments Architecture for Reliable, Secure,

    E-Print Network [OSTI]

    Kansas, University of

    challenge. The ACE - Ambient Computational Environments - architecture aims at high- scale and seamlessThe Ambient Computational Environments Architecture for Reliable, Secure, and Pervasive Computing The University of Kansas #12;Abstract During the past few years, the technology world has become more and more

  10. Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security Reliability Criteria

    E-Print Network [OSTI]

    Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security reliability criterion, probabilistic reliability criterion and security criterion based on N- contingency control system as well as reasonable strength of grid originally. Because investment for power system

  11. A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers

    E-Print Network [OSTI]

    Xu, Haiping

    A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers Haiping Xu and Deepti stored in the cloud. In this paper, we propose a reliable and secure cloud storage schema using multiple at the server side, we propose a reliable and secure cloud storage schema that can be implemented at the client

  12. Microgrids and Heterogeneous Security, Quality, Reliability, and Availability

    E-Print Network [OSTI]

    Marnay, Chris

    2007-01-01

    quality, reliability, and availability,” IEEE Power & EnergyReliability, and Availability Chris Marnay EnvironmentalQuality, Reliability, and Availability C. Marnay Ernest

  13. Security-Constrained Adequacy Evaluation of Bulk Power System Reliability

    E-Print Network [OSTI]

    contingency selection, (b) effects analysis, and (c) reliability index computation. Effects analysis as an optimization problem with the objective function being the bid cost function and congestion constraints and reliability index computations. The methodology is demonstrated with the IEEE reliability test system. Index

  14. Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    1 Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid Husheng, Cookeville, TN Abstract-- Secure system state estimation is an important issue in smart grid to assure the information the- oretic perspective. The smart grid is modeled as a linear dynamic system. Then, the channel

  15. Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security

    E-Print Network [OSTI]

    Heidemann, John

    Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability is that openness and support for disclosure of future SCADA data can in improved safety, reliability, and security-network processing are needed to make greater openness and data sharing data viable. Today's SCADA systems are often

  16. North American Electricity Infrastructure: System Security, Quality, Reliability, Availability, and Efficiency

    E-Print Network [OSTI]

    Amin, S. Massoud

    1 North American Electricity Infrastructure: System Security, Quality, Reliability, Availability for reliable and disturbance-free electricity. The massive power outages in the United States, Canada, UK and Italy in 2003 underscored electricity infrastructure's vulnerabilities [1-11]. This vital yet complex

  17. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    SciTech Connect (OSTI)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  18. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    SciTech Connect (OSTI)

    Crawford, Cary E.; de Boer, Gloria; De Castro, Kara; Landers, John; Rogers, Erin

    2010-10-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the “human factor.” Gen. Eugene Habiger, a former “Assistant Secretary for Safeguards and Security” at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that “good security is 20% equipment and 80% people.”1 Although eliminating the “human factor” is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  19. Reliable fuel source | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAbout UsRegional companiesReliability

  20. o secure a safe, reliable and low-carbon energy future, we must alter

    E-Print Network [OSTI]

    Kammen, Daniel M.

    T o secure a safe, reliable and low- carbon energy future, we must alter both technologies and human behav- iour1 . The US Department of Energy notes2 that supply and demand is "affected as much-makers continue to focus on only one side of the energy dilemma. In the United States

  1. Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity

    E-Print Network [OSTI]

    Danezis, George

    of traditional high- and low-latency anonymous communication systems, as well as on the Hydra-Onion and Cashmere networks, showing that they cannot tolerate a majority of nodes be- ing malicious. Cashmere, Hydra-Onion and high-latency anonymous systems. The low- latency systems are exemplified by Tor, a popular anony- mou

  2. Nuclear Weapons Latency 

    E-Print Network [OSTI]

    Sweeney, David J

    2014-07-25

    in certain cases. However, use of MAUA for adversary modeling also significantly increased the number of assumptions necessary. A Latency investigation of South Korean nuclear fuel cycle facility development, a current nonproliferation policy concern...

  3. Electric Power Infrastructure Reliability and Security (EPIRS) Reseach and Development Initiative

    SciTech Connect (OSTI)

    Rick Meeker; L. Baldwin; Steinar Dale; Alexander Domijan; Davild Larbalestier; Hui Li; Peter McLaren; Sastry Pamidi; Horatio Rodrigo; Michael Steurer

    2010-03-31

    Power systems have become increasingly complex and face unprecedented challenges posed by population growth, climate change, national security issues, foreign energy dependence and an aging power infrastructure. Increased demand combined with increased economic and environmental constraints is forcing state, regional and national power grids to expand supply without the large safety and stability margins in generation and transmission capacity that have been the rule in the past. Deregulation, distributed generation, natural and man-made catastrophes and other causes serve to further challenge and complicate management of the electric power grid. To meet the challenges of the 21st century while also maintaining system reliability, the electric power grid must effectively integrate new and advanced technologies both in the actual equipment for energy conversion, transfer and use, and in the command, control, and communication systems by which effective and efficient operation of the system is orchestrated - in essence, the 'smart grid'. This evolution calls for advances in development, integration, analysis, and deployment approaches that ultimately seek to take into account, every step of the way, the dynamic behavior of the system, capturing critical effects due to interdependencies and interaction. This approach is necessary to better mitigate the risk of blackouts and other disruptions and to improve the flexibility and capacity of the grid. Building on prior Navy and Department of Energy investments in infrastructure and resources for electric power systems research, testing, modeling, and simulation at the Florida State University (FSU) Center for Advanced Power Systems (CAPS), this project has continued an initiative aimed at assuring reliable and secure grid operation through a more complete understanding and characterization of some of the key technologies that will be important in a modern electric system, while also fulfilling an education and outreach mission to provide future energy workforce talent and support the electric system stakeholder community. Building upon and extending portions of that research effort, this project has been focused in the following areas: (1) Building high-fidelity integrated power and controls hardware-in-the-loop research and development testbed capabilities (Figure 1). (2) Distributed Energy Resources Integration - (a) Testing Requirements and Methods for Fault Current Limiters, (b) Contributions to the Development of IEEE 1547.7, (c) Analysis of a STATCOM Application for Wind Resource Integration, (d) Development of a Grid-Interactive Inverter with Energy Storage Elements, (e) Simulation-Assisted Advancement of Microgrid Understanding and Applications; (3) Availability of High-Fidelity Dynamic Simulation Tools for Grid Disturbance Investigations; (4) HTS Material Characterization - (a) AC Loss Studies on High Temperature Superconductors, (b) Local Identification of Current-Limiting Mechanisms in Coated Conductors; (5) Cryogenic Dielectric Research; and (6) Workshops, education, and outreach.

  4. The 7th IEEE International Conference on Software Security and Reliability

    E-Print Network [OSTI]

    Sandhu, Ravi

    : Attributes, Automation and Adaptation Ravi Sandhu Lutcher Brown Endowed Chair in Cyber Security Department of the center pieces of cyber security. This talk will focus on three necessary characteristics of access this vision a reality. About the speaker Ravi Sandhu is Executive Director of the Institute for Cyber Security

  5. Apparatus for fixing latency

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Moon, Justin (Bountiful, UT); Koehler, Roger O. (Provo, UT)

    2009-09-08

    An apparatus for fixing computational latency within a deterministic region on a network comprises a network interface modem, a high priority module and at least one deterministic peripheral device. The network interface modem is in communication with the network. The high priority module is in communication with the network interface modem. The at least one deterministic peripheral device is connected to the high priority module. The high priority module comprises a packet assembler/disassembler, and hardware for performing at least one operation. Also disclosed is an apparatus for executing at least one instruction on a downhole device within a deterministic region, the apparatus comprising a control device, a downhole network, and a downhole device. The control device is near the surface of a downhole tool string. The downhole network is integrated into the tool string. The downhole device is in communication with the downhole network.

  6. Human Reliability Program Overview

    SciTech Connect (OSTI)

    Bodin, Michael

    2012-09-25

    This presentation covers the high points of the Human Reliability Program, including certification/decertification, critical positions, due process, organizational structure, program components, personnel security, an overview of the US DOE reliability program, retirees and academia, and security program integration.

  7. Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRDEnergy Copyrights A copyright is a federal rightSecurity and

  8. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  9. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    total of 15 metrics. Pathway reliability General objectives Adequacy Security Functional zones Primary energy supply

  10. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    total of 15 metrics. Pathway reliability General objectives Adequacy Security Functional zones Primary energy supply

  11. PRINCE A Low-latency Block Cipher for Pervasive Computing Applications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    PRINCE ­ A Low-latency Block Cipher for Pervasive Computing Applications Full version Julia pervasive applications with real-time security needs. Our cipher, named PRINCE, allows encryption of data and encryption results in minimum additional costs. PRINCE is designed in such a way that the overhead for decryp

  12. Low Latency Messages on Distributed Memory Multiprocessors

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Rosing, Matt; Saltz, Joel

    1995-01-01

    This article describes many of the issues in developing an efficient interface for communication on distributed memory machines. Although the hardware component of message latency is less than 1 ws on many distributed memory machines, the software latency associated with sending and receiving typed messages is on the order of 50 ?s. The reason for this imbalance is that the software interface does not match the hardware. By changing the interface to match the hardware more closely, applications with fine grained communication can be put on these machines. This article describes several tests performed and many of the issues involvedmore »in supporting low latency messages on distributed memory machines.« less

  13. Low Latency Stochastic Filtering Software Firewall Architecture 

    E-Print Network [OSTI]

    Ghoshal, Pritha

    2012-08-29

    firewall architecture which removes the sequential ACL lookup from the critical path and thus decreases the latency per packet in the common case. To accomplish this we implement a Bloom filter-based, stochastic pre-classification stage, enabling...

  14. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  15. Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems.

    SciTech Connect (OSTI)

    Ruthruff, Joseph; Armstrong, Robert C.; Davis, Benjamin Garry; Mayo, Jackson; Punnoose, Ratish J.

    2012-09-01

    Formal methods describe a class of system analysis techniques that seek to prove specific propertiesabout analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest fromboth internal and external customersof Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquelypositioned to advance the state-of-the-art with respect toseveral research and application areaswithin formal methods. This research project was a one-yeareffort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research&Development program toinvestigate the opportunities for formal methods to impactSandia's present mission areas, morefully understand the needs of the research community in the area of formal methods and whereSandia can contribute, and clarify from those potential research paths those that would best advancethe mission-area interests of Sandia. The accomplishmentsfrom this project reinforce the utilityof formal methods in Sandia, particularly in areas relevantto Cyber Security, and set the stagefor continued Sandia investments to ensure this capabilityis utilized and advanced within thislaboratory to serve the national interest.4

  16. Broadcast Flooding Revisited: Survivability and Latency

    E-Print Network [OSTI]

    Riedi, Rudolf H.

    Broadcast Flooding Revisited: Survivability and Latency Petteri Mannersalo VTT Technical Research University Email: riedi@rice.edu Abstract--This paper addresses the dynamics of broadcast flooding in random wireless ad hoc networks. In particular, we study the subset of nodes covered by a flood as well as timing

  17. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  18. PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA

    E-Print Network [OSTI]

    by Rouslan V. Solomakhin DARTMOUTH COLLEGE Hanover, New Hampshire June 2010 Dartmouth Computer Science and by the Department of Energy under Award Number DE-OE0000097. I am grateful to Paul Myrda of Electric Power Research

  19. Efficiently Monitoring Bandwidth and Latency in IP Networks

    E-Print Network [OSTI]

    Chan, Chee Yong

    of the up-to-date band- width utilizations and path latencies is critical for numerous im- portant network the challenging problem of efficiently monitoring bandwidth utilization and path latencies in an IP data network of links or packet flows, and (b) path latencies for a given set of paths, while minimizing the overhead

  20. Efficiently Monitoring Bandwidth and Latency in IP Networks

    E-Print Network [OSTI]

    Garofalakis, Minos

    of the up­to­date band­ width utilizations and path latencies is critical for numerous im­ portant network the challenging problem of efficiently monitoring bandwidth utilization and path latencies in an IP data network of links or packet flows, and (b) path latencies for a given set of paths, while minimizing the overhead

  1. POWER GRID RELIABILITY AND SECURITY

    SciTech Connect (OSTI)

    Bose, Anjan; Venkatasubramanian, Vaithianathan; Hauser, Carl; Bakken, David; Anderson, David; Zhao, Chuanlin; Liu, Dong; Yang, Tao; Meng, Ming; Zhang, Lin; Ning, Jiawei; Tashman, Zaid

    2014-09-30

    This project has led to the development of a real-time simulation platform for electric power grids called Grid Simulator or GridSim for simulating the dynamic and information network interactions of large- scale power systems. The platform consists of physical models of power system components including synchronous generators, loads and control, which are simulated using a modified commercial power simulator namely Transient Stability Analysis Tool (TSAT) [1] together with data cleanup components, as well as an emulated substation level and wide-area power analysis components. The platform also includes realistic representations of communication network middleware that can emulate the real-time information flow back and forth between substations and control centers in wide-area power systems. The platform has been validated on a realistic 6000-bus model of the western American power system. The simulator GridSim developed in this project is the first of its kind in its ability to simulate real-time response of large-scale power grids, and serves as a cost effective real-time stability and control simulation platform for power industry.

  2. Human Reliability Program Workshop

    SciTech Connect (OSTI)

    Landers, John; Rogers, Erin; Gerke, Gretchen

    2014-05-18

    A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security and the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.

  3. Tiered-Latency DRAM: A Low Latency and Low Cost DRAM Architecture Donghyuk Lee Yoongu Kim Vivek Seshadri Jamie Liu Lavanya Subramanian Onur Mutlu

    E-Print Network [OSTI]

    Mutlu, Onur

    .5 SDR-200 DDR-400 DDR2-800 DDR3-1066 DDR3-1333 2000 2003 2006 2008 2011 Capacity Latency (tRCD) Latency

  4. Transmission Reliability Program 2015 Reliability & Markets Peer...

    Office of Environmental Management (EM)

    Transmission Reliability Program 2015 Reliability & Markets Peer Review Materials Available Transmission Reliability Program 2015 Reliability & Markets Peer Review Materials...

  5. Low latency and persistent data storage

    DOE Patents [OSTI]

    Fitch, Blake G; Franceschini, Michele M; Jagmohan, Ashish; Takken, Todd

    2014-11-04

    Persistent data storage is provided by a computer program product that includes computer program code configured for receiving a low latency store command that includes write data. The write data is written to a first memory device that is implemented by a nonvolatile solid-state memory technology characterized by a first access speed. It is acknowledged that the write data has been successfully written to the first memory device. The write data is written to a second memory device that is implemented by a volatile memory technology. At least a portion of the data in the first memory device is written to a third memory device when a predetermined amount of data has been accumulated in the first memory device. The third memory device is implemented by a nonvolatile solid-state memory technology characterized by a second access speed that is slower than the first access speed.

  6. Low latency and persistent data storage

    DOE Patents [OSTI]

    Fitch, Blake G; Franceschini, Michele M; Jagmohan, Ashish; Takken, Todd E

    2014-02-18

    Persistent data storage is provided by a method that includes receiving a low latency store command that includes write data. The write data is written to a first memory device that is implemented by a nonvolatile solid-state memory technology characterized by a first access speed. It is acknowledged that the write data has been successfully written to the first memory device. The write data is written to a second memory device that is implemented by a volatile memory technology. At least a portion of the data in the first memory device is written to a third memory device when a predetermined amount of data has been accumulated in the first memory device. The third memory device is implemented by a nonvolatile solid-state memory technology characterized by a second access speed that is slower than the first access speed.

  7. Method of data communications with reduced latency

    DOE Patents [OSTI]

    Blocksome, Michael A; Parker, Jeffrey J

    2013-11-05

    Data communications with reduced latency, including: writing, by a producer, a descriptor and message data into at least two descriptor slots of a descriptor buffer, the descriptor buffer comprising allocated computer memory segmented into descriptor slots, each descriptor slot having a fixed size, the descriptor buffer having a header pointer that identifies a next descriptor slot to be processed by a DMA controller, the descriptor buffer having a tail pointer that identifies a descriptor slot for entry of a next descriptor in the descriptor buffer; recording, by the producer, in the descriptor a value signifying that message data has been written into descriptor slots; and setting, by the producer, in dependence upon the recorded value, a tail pointer to point to a next open descriptor slot.

  8. Nash Equilibria in Discrete Routing Games with Convex Latency Functions

    E-Print Network [OSTI]

    Mavronicolas, Marios

    Nash Equilibria in Discrete Routing Games with Convex Latency Functions Martin Gairing Thomas L is determined by an arbitrary non-decreasing, non-constant and convex latency function . In a Nash equilib- rium on the link it chooses. To evaluate Nash equilibria, we formulate Social Cost as the sum of the users

  9. Storage Performance Virtualization via Throughput and Latency Control

    E-Print Network [OSTI]

    Riska, Alma

    Storage Performance Virtualization via Throughput and Latency Control JIANYONG ZHANG, ANAND storage systems. A consequence of this trend is the need to serve multiple users and/or workloads of the underlying storage system; (2) couple rate and latency allocation in a single scheduler, making them less

  10. Motivating Future Interconnects: A Differential Measurement Analysis of PCI Latency

    E-Print Network [OSTI]

    Hand, Steven

    Motivating Future Interconnects: A Differential Measurement Analysis of PCI Latency David J. Miller illustrate how an evolution in the common PCI interconnect architecture has worsened latency by a factor, mi- crobenchmark, measurement, PCI Express 1. INTRODUCTION Demand for performance is constantly

  11. Matched Public PUF: Ultra Low Energy Security Platform

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    Matched Public PUF: Ultra Low Energy Security Platform Saro Meguerdichian and Miodrag Potkonjak and energy costs and enables a majority of security protocols to be completed in a single or a few clock an ultimately low energy and low latency security approach that enables the device to operate in hostile

  12. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2007-02-06

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  13. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  14. A Latency-Determining/User Directed Firefox Browser Extension

    E-Print Network [OSTI]

    Mein, Philip

    2012-12-31

    " Mozilla Firefox extension which was originally developed by Sterbenz et. al., in 2002. This these describes the architecture and prototype implementation, followed with an analysis of its effectiveness to predict latency and future work...

  15. Low-latency network coding for streaming video multicast

    E-Print Network [OSTI]

    Tay, Kah Keng

    2008-01-01

    Network coding has been successfully employed to increase throughput for data transfers. However, coding inherently introduces packet inter-dependencies and adds decoding delays which increase latency. This makes it difficult ...

  16. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  17. Electricity Reliability

    E-Print Network [OSTI]

    Post, Wilfred M.

    Electricity Delivery and Energy Reliability High Temperature Superconductivity (HTS) Visualization in the future because they have virtually no resistance to electric current, offering the possibility of new electric power equipment with more energy efficiency and higher capacity than today's systems

  18. Scalla: Structured Cluster Architecture for Low Latency Access

    SciTech Connect (OSTI)

    Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

    2012-03-20

    Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

  19. Strategic Theme 1- Energy Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strategic Theme 1- Energy Security Strategic Theme 1- Energy Security An article describing the ways in which America can create an economically strong requires reliable, clean,...

  20. Reliable low latency I/O in torus-based interconnection networks 

    E-Print Network [OSTI]

    Azeez, Babatunde

    2007-04-25

    In today's high performance computing environment I/O remains the main bottleneck in achieving the optimal performance expected of the ever improving processor and memory technologies. Interconnection networks therefore ...

  1. Nash Equilibria in Discrete Routing Games with Convex Latency Functions

    E-Print Network [OSTI]

    Mavronicolas, Marios

    Nash Equilibria in Discrete Routing Games with Convex Latency Functions Martin Gairing1 , Thomas L 20537, Nicosia CY-1678, Cyprus. mavronic@ucy.ac.cy Abstract. We study Nash equilibria in a discrete, this is the first time that mixed Nash equilibria for routing games have been studied in combination with non

  2. Practical Large-Scale Latency Estimation Michal Szymaniak

    E-Print Network [OSTI]

    Cortes, Corinna

    not partic- ipated in our measurements at all. The results are sufficiently promising that Google may offer to not always be a good indication of their current coun- terparts, as one latency measurement result is not a good predictor of a subsequent identical measurement. These two problems drive the need for scalable

  3. Weld: A Multithreading Technique Towards Latency-tolerant VLIW Processors

    E-Print Network [OSTI]

    Conte, Thomas M.

    Weld: A Multithreading Technique Towards Latency- tolerant VLIW Processors Emre Ă?zer, Thomas M architecture model, named Weld, for VLIW processors. Weld integrates multithreading support into a VLIW a novel hardware technique called operation welding that merges operations from different threads

  4. Preventing Active Timing Attacks in Low-Latency Anonymous Communication

    E-Print Network [OSTI]

    Johnson, Aaron

    elsewhere, and it can be quite insufficient. Consider Tor [7], the popular imple- mentation of onion. Low-latency anonymous communication protocols in gen- eral, and the popular onion-routing protocol on the Tor network to estimate the real-world per- formance of our protocol, showing that the added delay

  5. Accounting for Memory Use, Cost, Throughput, and Latency in the Design of a Media Server

    E-Print Network [OSTI]

    Chang, Edward Y.

    : the per­stream costs and the worst­case initial latency before a new media request can be satisfied. WeAccounting for Memory Use, Cost, Throughput, and Latency in the Design of a Media Server Edward scheduling and data place­ ment ones. We show that, some disk latency reduction techniques can

  6. Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility

    E-Print Network [OSTI]

    Gupta, Rajesh

    Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility Ryo Sugihara Rajesh the flexibility in the energy-latency trade-off for sensor network communications. I. INTRODUCTION Controlled the energy-latency trade-off when using a data mule. We design a problem framework for optimizing the data

  7. Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility

    E-Print Network [OSTI]

    Gupta, Rajesh

    Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility Ryo Sugihara Rajesh increasing the flexibility in the energy-latency trade-off for sensor network communications. I. INTRODUCTION the energy-latency trade-off when using a data mule. We design a problem framework for optimizing the data

  8. Aggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive

    E-Print Network [OSTI]

    Lau, Francis C.M.

    Aggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive Interference investigate the latency-energy tradeoff for data aggregation in wireless sensor networks under the physical lowest possible level. Index Terms--Data aggregation, latency-energy tradeoff, wireless sensor network

  9. Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    [3,4,10,7,6,16,14,8,11]. Most of these networks are based on one of two methods: onion routing and DC to be re-configured). Research into the per- formance of Tor [6] and JAP [14] shows a high latency (e.g. around 4 seconds for some Cascades in JAP, around 4.5 seconds for Tor) and either a low (e.g. around 15

  10. Energy Infrastructure Events and Expansions Infrastructure Security...

    Broader source: Energy.gov (indexed) [DOE]

    in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S. Department of...

  11. Low latency search for compact binary coalescences using MBTA

    E-Print Network [OSTI]

    Adams, T

    2015-01-01

    The Multi-Band Template Analysis is a low-latency analysis pipeline for the detection of gravitational waves to triggering electromagnetic follow up observations. Coincident observation of gravitational waves and an electromagnetic counterpart will allow us to develop a complete picture of energetic astronomical events. We give an outline of the MBTA pipeline, as well as the procedure for distributing gravitational wave candidate events to our astronomical partners. We give some details of the recent work that has been done to improve the MBTA pipeline and are now making preparations for the advanced detector era.

  12. Allan Friedman & L. Jean Camp, "Making Security Manifest," Second Workshop on the Economics of Information Security (College Park, MA) May 2003.

    E-Print Network [OSTI]

    Camp, L. Jean

    With the increased concern over national security there has been increased debate over reliability and securityAllan Friedman & L. Jean Camp, "Making Security Manifest," Second Workshop on the Economics of Information Security (College Park, MA) May 2003. Making Security Manifest Security and Autonomy for End Users

  13. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  14. DDR2 and Low Latency Variants Brian Davis, Trevor Mudge Bruce Jacob, Vinodh Cuppu

    E-Print Network [OSTI]

    Mudge, Trevor

    DDR2 and Low Latency Variants Brian Davis, Trevor Mudge Bruce Jacob, Vinodh Cuppu Electrical describes a performance examination the DDR2 DRAM architecture and the proposed cache­enhanced variants. This Task Group responsible for developing DDR2 standard. The goal the Low Latency DRAM Working Group

  15. Onion Routing Circuit Construction Via Latency Graphs Sergio Castillo-Perez,a

    E-Print Network [OSTI]

    Garcia-Alfaro, Joaquin

    privacy problems on the Internet. Tor (short for The onion router) is a popular low-latency anonymity]. Nowadays, it is distributed as a free software implementation known as Tor (The onion router [2]). It canOnion Routing Circuit Construction Via Latency Graphs Sergio Castillo-P´erez,a , Joaquin Garcia

  16. Energy, Latency and Capacity Trade-offs in wireless multi-hop networks

    E-Print Network [OSTI]

    Jaffrčs-Runser, Katia

    Energy, Latency and Capacity Trade-offs in wireless multi-hop networks Jean-Marie Gorce, Ruifeng Abstract--This paper concentrates on characterizing energy, latency and capacity trade-offs in multi, our analytical results highlight how the energy/delay Pareto front moves when considering a capacity

  17. Jockey: Guaranteed Job Latency in Data Parallel Clusters Andrew D. Ferguson

    E-Print Network [OSTI]

    Fonseca, Rodrigo

    are completed by importance Conceptually, Jockey is 1) a function from progress and allocation to remaining run runtime running job utility function job stats latency predictions resource allocation control loop job resources, which can also fail Why does latency vary? Allocation above oracle Released resources

  18. Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems

    E-Print Network [OSTI]

    Xie, Tao

    . Assign ti to pv 16. Update the schedule on node pv 17. Compute the energy consumed by ti on pvSolving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded with an objective of energy-saving and short- latency. A novel task allocation strategy, or BEATA (Balanced Energy

  19. An Energy Optimization Technique for Latency and Quality Constrained Video Applications

    E-Print Network [OSTI]

    Ha, Soonhoi

    An Energy Optimization Technique for Latency and Quality Constrained Video Applications Chaeseok Im noticeable energy reduction satisfying the given latency and video quality constraints. 1 Introduction quality, to increase the slack times and their utilization in order to minimize the system energy

  20. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    Physical security Information security Interdepend- enciesagainst threats. Information security: The degree to whichPhysical security Information security Interdependencies

  1. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    Physical security Information security Interdepend- enciesagainst threats. Information security: The degree to whichPhysical security Information security Interdependencies

  2. Communication Reliability in Network on Chip Designs 

    E-Print Network [OSTI]

    Kumar, Reeshav

    2012-10-19

    The performance of low latency Network on Chip (NoC) architectures, which incorporate fast bypass paths to reduce communication latency, is limited by crosstalk induced skewing of signal transitions on link wires. As a ...

  3. cybersecurity.pnnl.gov Securing the Nation's Critical Infrastructure

    E-Print Network [OSTI]

    : » Global Threat Intelligence » Electric Grid Security » Cyber Physical Systems » Bio-inspired Security and evaluating safeguards, we can provide a better defense against threats or adversaries. Electric Grid Security PNNL is leading the charge to secure a safer and more reliable grid. We are currently developing cyber

  4. Office of Test and Evaluation | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    weapons stockpile are safe, secure, and reliable by: Providing for development of engineering tools and manufacturing capabilities to support the life cycle of a nuclear weapon...

  5. Decisions regarding how to secure and invest in our

    Office of Environmental Management (EM)

    to ensure that the Nation's energy delivery system is secure, resilient and reliable. Pictures go here. Creating a Risk Assessment Culture for State Energy Infrastructure Decision...

  6. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  7. Reliability Assessment The Reliability of the

    E-Print Network [OSTI]

    ...................................................................................................................4 SUMMER 2006 HEAT WAVE .......................6 CONSTRUCTION OF NEW TRANSMISSION IS STILL SLOW -- CONTINUES TO FACE OBSTACLES..............................................11 RELIABILITY WILL DEPEND ON CLOSE COORDINATION OF GENERATION AND TRANSMISSION PLANNING

  8. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  9. Software News and Update Speeding Up Parallel GROMACS on High-Latency

    E-Print Network [OSTI]

    de Groot, Bert

    bandwidth and high latency. GROMACS 3.3 scales well on supercomputers like the IBM p690 (Regatta improvements and speedups can be achieved by digging a bit into the technical details. As will be shown, nearly

  10. Achieving Low-Latency Communication with Feedback: from Information Theory to System Design

    E-Print Network [OSTI]

    Chen, Tsung-Yi

    2013-01-01

    specifying a constraint on the outage probability P[E 4 ] =specifying a constraint on the outage probability p 4 on theexpected latency un- der an outage constraint. • RCSP

  11. Sandia Energy - Human Reliability Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Human Reliability Assessment Home Stationary Power Nuclear Fuel Cycle Nuclear Energy Safety Technologies Risk and Safety Assessment Human Reliability Assessment Human Reliability...

  12. Towards a Scalable and Reliable Real Time In-Network Data Analysis Infrastructure

    SciTech Connect (OSTI)

    Ciraci, Selim; Yin, Jian

    2011-12-01

    The smart grid applications requires real time analysis, response within the order of milliseconds and high-reliability because of the mission critical structure of the power grid system. The only way to satisfy these requirements is in network data analysis and build-in redundancy routing for failures. To achieve this, we propose a data dissemination system that builds routes using network flow algorithms, have in network processing of the data and utilize data encoding to cope with high latencies.

  13. Medical Aspects of Reliability

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation covers the medical evaluation as part of a human reliability program, particularly the various medical qualifications and potential disqualifiers.

  14. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  15. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  16. Reliable Energy Integration of

    E-Print Network [OSTI]

    Zeng, Ning

    Engineering SustainabilityWorkshop #12;Cost of EnergyTrends Engineering SustainabilityWorkshop #12;Why GoReliable Energy Integration of Offshore Wind Aris Christou University of Maryland College Park MD Access is Difficult, and Costly: Require Minimum Maintenance and High Reliability Engineering

  17. Hawaii electric system reliability.

    SciTech Connect (OSTI)

    Silva Monroy, Cesar Augusto; Loose, Verne William

    2012-09-01

    This report addresses Hawaii electric system reliability issues; greater emphasis is placed on short-term reliability but resource adequacy is reviewed in reference to electric consumers' views of reliability %E2%80%9Cworth%E2%80%9D and the reserve capacity required to deliver that value. The report begins with a description of the Hawaii electric system to the extent permitted by publicly available data. Electrical engineering literature in the area of electric reliability is researched and briefly reviewed. North American Electric Reliability Corporation standards and measures for generation and transmission are reviewed and identified as to their appropriateness for various portions of the electric grid and for application in Hawaii. Analysis of frequency data supplied by the State of Hawaii Public Utilities Commission is presented together with comparison and contrast of performance of each of the systems for two years, 2010 and 2011. Literature tracing the development of reliability economics is reviewed and referenced. A method is explained for integrating system cost with outage cost to determine the optimal resource adequacy given customers' views of the value contributed by reliable electric supply. The report concludes with findings and recommendations for reliability in the State of Hawaii.

  18. SPIDERS JCTD Smart Cyber-Secure Microgrids

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) Joint Capability Technology Demonstration (JCTD) is a groundbreaking program to bolster the cyber security and energy efficiency of U.S. military installations and transfer the knowhow to non-military critical infrastructure.

  19. Policy-based Secure Deletion Christian Cachin

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Sorniotti February 28, 2013 Abstract Securely deleting data from storage systems has become difficult today in storage systems, whose security relies on the proper erasure of cryptographic keys. Deletion operations storage systems do not include operations to reliably destroy stored information. Common deletion

  20. Reliability and Safety

    Broader source: Energy.gov [DOE]

    DOE solar reliability and safety research and development (R&D) focuses on testing photovoltaic (PV) modules, inverters, and systems for long-term performance, and helping investors, consumers,...

  1. Solid State Lighting Reliability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solid State Lighting Reliability 2015Building Technologies Office Peer Review Lynn Davis, PhD RTI International ldavis@rti.org --- 919-316-3325 Project Summary Timeline: Start...

  2. Low-Latency Multi-Datacenter Databases using Replicated Hatem A. Mahmoud, Alexander Pucher, Faisal Nawab,

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    Low-Latency Multi-Datacenter Databases using Replicated Commits Hatem A. Mahmoud, Alexander Pucher to provide the same ACID transac- tional guarantees for multi-datacenter databases with fewer cross- datacenter communication trips, compared to replicated logging, by using a more efficient architecutre

  3. Comparing Energy and Latency of Asynchronous and Synchronous NoCs for Embedded SoCs

    E-Print Network [OSTI]

    Stevens, Ken

    -on-chip (NoC) of both these classes should be optimized for minimal energy usage while meeting the predictedComparing Energy and Latency of Asynchronous and Synchronous NoCs for Embedded SoCs Daniel Gebhardt School of Computing University of Utah gebhardt@cs.utah.edu Junbok You Kenneth S. Stevens Dept

  4. Improving IEEE 802.15.4 for Low-latency Energy-efficient Industrial Applications

    E-Print Network [OSTI]

    Breu, Ruth

    &D" of Siemens AG is currently evaluating wireless technology in the field of industrial automation.1 An Industrial Case Study The typical application scenario for automation environments to be studiedImproving IEEE 802.15.4 for Low-latency Energy-efficient Industrial Applications Feng Chen Computer

  5. DDR2 and Low Latency Variants Brian Davis, Trevor Mudge Bruce Jacob, Vinodh Cuppu

    E-Print Network [OSTI]

    Davis, Brian T.

    1 DDR2 and Low Latency Variants Brian Davis, Trevor Mudge Bruce Jacob, Vinodh Cuppu Electrical describes a performance examination of the DDR2 DRAM architecture and the proposed cache-enhanced variants Task Group. This Task Group is responsible for developing the DDR2 standard. The goal of the Low

  6. Challenges in deploying low-latency anonymity (DRAFT) Roger Dingledine1

    E-Print Network [OSTI]

    to deploying anonymous communications. Drawing on our experiences deploying Tor (the second-generation onion deploying Tor, a low-latency general-purpose anonymous communi- cation system. We will discuss some discuss some less troublesome open problems that we must nevertheless eventually address. Tor

  7. A Real-time World Model for Multi-Robot Teams with High-Latency Communication

    E-Print Network [OSTI]

    Veloso, Manuela M.

    A Real-time World Model for Multi-Robot Teams with High-Latency Communication Maayan Roth, Douglas Vail, and Manuela Veloso School of Computer Science Carnegie Mellon University Pittsburgh PA, 15213- structing a world model in a multi-robot team. We in- troduce two separate world models, namely

  8. An AWGR based Low-Latency Optical Switch for Data Centers and High Performance Computing Systems

    E-Print Network [OSTI]

    Yoo, S. J. Ben

    i An AWGR based Low-Latency Optical Switch for Data Centers and High Performance Computing Systems based optical switch for data centers and high performance computing systems that builds upon several for Data Centers and High Performance Computing Systems ..i ABSTRACT .....................................

  9. Message-Optimal and Latency-Optimal Termination Detection Algorithms for Arbitrary

    E-Print Network [OSTI]

    Mittal, Neeraj

    Message-Optimal and Latency-Optimal Termination Detection Algorithms for Arbitrary Topologies. Detecting termination of a distributed computation is a fun- damental problem in distributed systems. We present two optimal algo- rithms for detecting termination of a non-diffusing distributed computa- tion

  10. Low-Latency Mobile IP Hando for Infrastructure-Mode Wireless LANs

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    Low-Latency Mobile IP Hando#11; for Infrastructure-Mode Wireless LANs Srikant Sharma Ningning Zhu roaming through multiple wireless LAN segments. However, the peculiarities of commer- cially available 802.11b wireless LAN hardware prevent existing mobile IP implementations from achieving sub- second Mobile

  11. Design of switches with reconfiguration latency Valentina Alaria, Andrea Bianco, Paolo Giaccone, Emilio Leonardi, Fabio Neri

    E-Print Network [OSTI]

    Design of switches with reconfiguration latency Valentina Alaria, Andrea Bianco, Paolo Giaccone switching fabrics (OSF) are considered to be appealing solutions for the design of high speed packet switches, due to their excellent scalability in terms of bandwidth and power consumption. Candidate

  12. Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems

    E-Print Network [OSTI]

    Xie, Tao

    concentrated on energy-saving when making allocation decisions. Consequently, the length of the schedules could of energy-saving and short-latency. A novel task allocation strategy, or BEATA (Balanced Energy- Aware Task in energy-saving for embedded systems share two common features (1) applications considered are real

  13. Service-Oriented Heterogeneous Resource Sharing for Optimizing Service Latency in Mobile Cloud

    E-Print Network [OSTI]

    Mandayam, Narayan

    Service-Oriented Heterogeneous Resource Sharing for Optimizing Service Latency in Mobile Cloud@winlab.rutgers.edu ABSTRACT Fog computing is expected to be an enabler of mobile cloud computing, which extends the cloud computing paradigm to the edge of the network. In the mobile cloud, not only central data centers but also

  14. Gearbox Reliability Collaborative Update (Presentation)

    SciTech Connect (OSTI)

    Sheng, S.

    2013-10-01

    This presentation was given at the Sandia Reliability Workshop in August 2013 and provides information on current statistics, a status update, next steps, and other reliability research and development activities related to the Gearbox Reliability Collaborative.

  15. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  16. The Y-12 National Security Complex 4-1 4. The Y-12 National Security Complex

    E-Print Network [OSTI]

    Pennycook, Steve

    a safe and reliable US nuclear weapons deterrent. The complex also retrieves and stores nuclear materials/enhanced surveillance of the nation's nuclear weapon stockpile; · safe and secure storage of nuclear materials" is NNSA's vision for a smaller, safer, more secure, and less expensive nuclear weapons complex

  17. The Y-12 National Security Complex 4-1 4. The Y-12 National Security Complex

    E-Print Network [OSTI]

    Pennycook, Steve

    a safe and reliable US nuclear weapons deterrent. The complex also retrieves and stores nuclear materials/enhanced surveillance of the nation's nuclear weapons stockpile; · safe and secure storage of nuclear materials secure, and less expensive nuclear weapons complex that leverages the scientific and technical

  18. The Y-12 National Security Complex 4-1 4. The Y-12 National Security Complex

    E-Print Network [OSTI]

    Pennycook, Steve

    a safe and reliable U.S. nuclear weapons deterrent. The Complex also retrieves and stores nuclear of the nation's nuclear weapon stockpile; · safe and secure storage of nuclear materials; · dismantlement secure, and less expensive nuclear weapons complex that leverages the scientific and technical

  19. Photovoltaic module reliability workshop

    SciTech Connect (OSTI)

    Mrig, L. (ed.)

    1990-01-01

    The paper and presentations compiled in this volume form the Proceedings of the fourth in a series of Workshops sponsored by Solar Energy Research Institute (SERI/DOE) under the general theme of photovoltaic module reliability during the period 1986--1990. The reliability Photo Voltaic (PV) modules/systems is exceedingly important along with the initial cost and efficiency of modules if the PV technology has to make a major impact in the power generation market, and for it to compete with the conventional electricity producing technologies. The reliability of photovoltaic modules has progressed significantly in the last few years as evidenced by warranties available on commercial modules of as long as 12 years. However, there is still need for substantial research and testing required to improve module field reliability to levels of 30 years or more. Several small groups of researchers are involved in this research, development, and monitoring activity around the world. In the US, PV manufacturers, DOE laboratories, electric utilities and others are engaged in the photovoltaic reliability research and testing. This group of researchers and others interested in this field were brought together under SERI/DOE sponsorship to exchange the technical knowledge and field experience as related to current information in this important field. The papers presented here reflect this effort.

  20. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  1. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  2. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  3. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  4. ISSAT 2012 KCoverage Reliability Evaluation K-COVERAGE RELIABILITY EVALUATION

    E-Print Network [OSTI]

    Xing, Liudong

    #12;7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 2 Introduction Wireless sensor;7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 7 Model 13 Consider a set of sensor nodes (SN7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 1 K-COVERAGE RELIABILITY EVALUATION

  5. Reliable solar: powering communities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAbout UsRegional companiesReliabilityReliable solar:

  6. Cyber security best practices for the nuclear industry

    SciTech Connect (OSTI)

    Badr, I.

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  7. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  8. A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage

    E-Print Network [OSTI]

    Xu, Haiping

    333 A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage Daniel F. Fitch, however, with data security, reliability, and availability in the cloud. In this paper, we address these concerns by proposing a novel security mechanism for secure and fault-tolerant cloud-based information

  9. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    today’s emphasis on cyber security and localized attacks (routine security, cyber security, diversity, storage,for example). Similarly, cyber security hardens cyber and

  10. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    today’s emphasis on cyber security and localized attacks (routine security, cyber security, diversity, storage,for example). Similarly, cyber security hardens cyber and

  11. Securing against fraud in mobile communications : system design and development in 3G mobile networks

    E-Print Network [OSTI]

    Mochizuki, Yujiro, 1973-

    2006-01-01

    Network security ensures the consistency, integrity, and reliability of telecommunications systems. Authorized network access prevents fraudulent communications and maintains the availability of the systems. However, limited ...

  12. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  13. Reliability of Electrical Interconnects (Presentation)

    SciTech Connect (OSTI)

    Devoto, D.

    2014-06-01

    This presentation discusses the status of NREL's research on the reliability of electrical interconnects.

  14. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  15. Capturing the electromagnetic counterparts of binary neutron star mergers through low latency gravitational wave triggers

    E-Print Network [OSTI]

    Chu, Q; Rowlinson, A; Gao, H; Zhang, B; Tingay, S J; Boer, M; Wen, L

    2015-01-01

    We investigate the prospects for joint low-latency gravitational wave (GW) detection and prompt electromagnetic (EM) follow-up observations of coalescing binary neutron stars (BNSs). Assuming BNS mergers are associated with short duration gamma ray bursts (SGRBs), we evaluate if rapid EM follow-ups can capture the prompt emission, early engine activity or reveal any potential by-products such as magnetars or fast radio bursts. To examine the expected performance of low-latency search pipelines we simulate a population of coalescing BNSs using realistic distributions of source parameters to estimate the detectability and localisation efficiency at different times before merger. To determine what EM observations can be achieved, we consider a selection of facilities with GW follow-up agreements in place, from low-frequency radio to high energy $\\gamma$-ray; we assess the performance of each using observational SGRB flux data corrected to the range of the advanced GW interferometric detectors LIGO and Virgo. We ...

  16. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  17. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  18. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  19. Capturing the electromagnetic counterparts of binary neutron star mergers through low latency gravitational wave triggers

    E-Print Network [OSTI]

    Q. Chu; E. J. Howell; A. Rowlinson; H. Gao; B. Zhang; S. J. Tingay; M. Boer; L. Wen

    2015-09-26

    We investigate the prospects for joint low-latency gravitational wave (GW) detection and prompt electromagnetic (EM) follow-up observations of coalescing binary neutron stars (BNSs). Assuming BNS mergers are associated with short duration gamma ray bursts (SGRBs), we evaluate if rapid EM follow-ups can capture the prompt emission, early engine activity or reveal any potential by-products such as magnetars or fast radio bursts. To examine the expected performance of low-latency search pipelines we simulate a population of coalescing BNSs using realistic distributions of source parameters to estimate the detectability and localisation efficiency at different times before merger. To determine what EM observations can be achieved, we consider a selection of facilities with GW follow-up agreements in place, from low-frequency radio to high energy $\\gamma$-ray; we assess the performance of each using observational SGRB flux data corrected to the range of the advanced GW interferometric detectors LIGO and Virgo. We show that while challenging, breakthrough multimessenger science is possible to achieve with a range of follow-up facilities using low latency pipelines. To catch the prompt stage ($<$ 5s) of SGRBs under this scenario, it is challenging even for instruments with a large field-of-view; we suggest this provides motivation to speed up the follow-up pipelines of both the GW observatories and EM facilities. We further show that adding an Australian instrument to an expanded detector network including LIGO-India and Japanese KAGRA, will improve the angular resolution by a factor of 2. Using this network with an almost instantaneous GW triggering latency, we show that if wide field-of-view X-ray instruments such as the proposed ISS-Lobster can employ fast triggering mechanisms, one could obtain almost complete temporal and multiwavelength coverage of the prompt and early activity of SGRBs.

  20. Solid State Lighting Reliability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4EnergySolid State Lighting Reliability 2014 Building

  1. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  2. Advances in high-throughput speed, low-latency communication for embedded instrumentation ( 7th Annual SFAF Meeting, 2012)

    ScienceCinema (OSTI)

    Jordan, Scott [Physik Instrumente

    2013-02-11

    Scott Jordan on "Advances in high-throughput speed, low-latency communication for embedded instrumentation" at the 2012 Sequencing, Finishing, Analysis in the Future Meeting held June 5-7, 2012 in Santa Fe, New Mexico.

  3. The Herpes Simplex Virus Type 1 Latency-Associated Transcript Inhibits Phenotypic and Functional Maturation of Dendritic Cells

    E-Print Network [OSTI]

    2012-01-01

    MV, et al. : The herpes simplex virus 1 latency-associatedfunctional exhaustion of virus-specific CD8 + T cells ininfected with herpes simplex virus 1. J Virol 3. Goldwich A,

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  5. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  6. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  7. Microgrids and Heterogeneous Security, Quality, Reliability, andAvailability

    SciTech Connect (OSTI)

    Marnay, Chris

    2007-01-31

    This paper describes two stylized alternative visions inpopular currencyof how the power system might evolve to meet futurerequirements for the high quality electricity service that modern digitaleconomies demand, a supergrids paradigm and a dispersed paradigm. Some ofthe economics of the dispersed vision are explored. Economic perspectivesare presented on both the choice of homogeneous universal power qualityupstream in the electricity supply, and also on the extremelyheterogeneous require-ments of end-use loads. Finally, the potential roleof microgrids in delivering heterogeneous power quality is demonstratedby reference to two ongoing microgrid tests in the U.S. andJapan.

  8. Microgrids and Heterogeneous Security, Quality, Reliability, and Availability

    E-Print Network [OSTI]

    Marnay, Chris

    2007-01-01

    G. Venkataramanan, “Microgrids in the evolving electricitymore background on microgrids, please see the presentationsthe two Symposiums on Microgrids held at Berkeley, USA in

  9. Guest Editorial Safety, reliability and security of industrial computer systems

    E-Print Network [OSTI]

    Felici, Massimo

    different stakeholders who drive the system life cycle as well as the dependability system requirements to certification, deployment, evaluation, evolution, and decommission in the system life cycle. There are two be tempted to looking for a universal model that may be used throughout the entire life cycle. A universal

  10. Office of Electricity Delivery and Energy Reliability Cyber Security

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties -DepartmentAvailableHigh SpatialElectricity Delivery and EnergyProject

  11. Cyber Security Summer School: Lessons for the Modern Grid

    Broader source: Energy.gov [DOE]

    The Energy Department has partnered with a university-based project performing cutting-edge research to improve the way electric infrastructure is built, increasing the security and reliability of the grid.

  12. PSH-14-0015- In the Matter of Personnel Security

    Broader source: Energy.gov [DOE]

    The individual is employed by a DOE contractor in a position that requires him to hold a DOE security clearance and participate in the Human Reliability Program (HRP).  He has been employed by the...

  13. Research and Medical Isotope Reactor Supply | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Y-12 tops the short list of the world's most secure, reliable uranium feedstock suppliers for dozens of research and test reactors on six continents. These reactors can be...

  14. Sandia Energy - PV Systems Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Stationary Power Energy Conversion Efficiency Solar Energy Photovoltaics PV Systems Reliability PV Systems ReliabilityCoryne Tasca2015-05-08T03:40:54+00:00 Sandia...

  15. Target Tracking with Packet Delays and Losses QoI amid Latencies and Missing Data

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    in the field, e.g., along the perimeter of a secured area, to monitor passing targets such as vehicles

  16. Testing for PV Reliability (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.; Bansal, S.

    2014-09-01

    The DOE SUNSHOT workshop is seeking input from the community about PV reliability and how the DOE might address gaps in understanding. This presentation describes the types of testing that are needed for PV reliability and introduces a discussion to identify gaps in our understanding of PV reliability testing.

  17. A systems-theoretic security model for large scale, complex systems applied to the US air transportation system

    E-Print Network [OSTI]

    Laracy, Joseph R. (Joseph Raymond)

    2007-01-01

    Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from ...

  18. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  19. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  20. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  1. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  5. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    infrastructure disruption, and energy security – valued by aHistory Consequences Energy security Economic Import levelsthose associated with energy security apply only to primary

  6. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    infrastructure disruption, and energy security – valued by aHistory Consequences Energy security Economic Import levelsthose associated with energy security apply only to primary

  7. Real Time Grid Reliability Management 2005

    E-Print Network [OSTI]

    Eto, Joe

    2008-01-01

    case, confidence in grid security will increase. Confidencecase, confidence in grid security will increase. Confidencecase, confidence in grid security will increase. Confidence

  8. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    H. , 2004. Energy infrastructure and security. Annual Reviewdisruption, and energy security – valued by a total of 15History Consequences Energy security Economic Import levels

  9. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    H. , 2004. Energy infrastructure and security. Annual Reviewdisruption, and energy security – valued by a total of 15History Consequences Energy security Economic Import levels

  10. Multipath Router Architectures to Reduce Latency in Network-on-Chips 

    E-Print Network [OSTI]

    Deshpande, Hrishikesh

    2012-07-16

    in Lower Con- gestion In modern MPSoCs, multimedia streaming data constitutes signi cant portion of network tra c. Multimedia tra c typically consists of lengthy packets. The latency 8 of such long packets can be reduced either by increasing link...), but only one can be used in traditional networks because of a single injection port. By doubling the width of the injection port and ejection port 9 Fig. 4. Total Transfer Time for 10000 Flits for Varying Packet Length in Higher Con- gestion...

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  13. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  14. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  15. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  16. Analysis and design of reliable nanometer circuits

    E-Print Network [OSTI]

    Zhao, Chong

    2007-01-01

    OF CALIFORNIA, SAN DIEGO Analysis and Design of ReliableTHE DISSERTATION Analysis and Design of Reliable Nanometerthe difficulty in analysis and design of reliable digital

  17. Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff

    E-Print Network [OSTI]

    Gursoy, Mustafa Cenk

    Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff required for secure and reliable communications, and the wideband slope. Increased bit energy requirements to security issues, another pivotal concern in most wireless systems is energy-efficient operation especially

  18. Sandia Energy - Inverter Reliability Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    lifetime cost must decrease for photovoltaics to be financially viable. Currently the cost and reliability of PV modules is improving faster than the rest of the system. One...

  19. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  20. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  1. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  2. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  3. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  4. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  5. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  6. Real Time Grid Reliability Management 2005

    SciTech Connect (OSTI)

    Eto, Joe; Eto, Joe; Lesieutre, Bernard; Lewis, Nancy Jo; Parashar, Manu

    2008-07-07

    The increased need to manage California?s electricity grid in real time is a result of the ongoing transition from a system operated by vertically-integrated utilities serving native loads to one operated by an independent system operator supporting competitive energy markets. During this transition period, the traditional approach to reliability management -- construction of new transmission lines -- has not been pursued due to unresolved issues related to the financing and recovery of transmission project costs. In the absence of investments in new transmission infrastructure, the best strategy for managing reliability is to equip system operators with better real-time information about actual operating margins so that they can better understand and manage the risk of operating closer to the edge. A companion strategy is to address known deficiencies in offline modeling tools that are needed to ground the use of improved real-time tools. This project: (1) developed and conducted first-ever demonstrations of two prototype real-time software tools for voltage security assessment and phasor monitoring; and (2) prepared a scoping study on improving load and generator response models. Additional funding through two separate subsequent work authorizations has already been provided to build upon the work initiated in this project.

  7. LMS Reliability FMECA and SPFS

    E-Print Network [OSTI]

    Rathbun, Julie A.

    LMS Reliability FMECA and SPFS Contract No. NAS 9-5829 NO. ATM 97C PAGE 1 REV. MO. B OF~- DATE 21 will use the fixed mode ionization voltage. Prepared by: Approved by: .... ~~~lfo*R. Hiebert LMS III v VI LMS Reliability FMECA and SPFS Contract No. NAS9-5829 TABLE CJF CONTENTS DISCUSSION

  8. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  9. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  10. Sensor Data Collection with Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sharad Mehrotra, Nalini Venkatasubramanian

    E-Print Network [OSTI]

    Venkatasubramanian, Nalini

    used to evaluate sensor applications in addition to energy efficiency/system lifetime, latency, accu

  11. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  14. OTRA-THS MAC to reduce Power Outage Data Collection Latency in a smart meter network

    SciTech Connect (OSTI)

    Garlapati, Shravan K; Kuruganti, Phani Teja; Buehrer, Richard M; Reed, Jeffrey H

    2014-01-01

    The deployment of advanced metering infrastructure by the electric utilities poses unique communication challenges, particularly as the number of meters per aggregator increases. During a power outage, a smart meter tries to report it instantaneously to the electric utility. In a densely populated residential/industrial locality, it is possible that a large number of smart meters simultaneously try to get access to the communication network to report the power outage. If the number of smart meters is very high of the order of tens of thousands (metropolitan areas), the power outage data flooding can lead to Random Access CHannel (RACH) congestion. Several utilities are considering the use of cellular network for smart meter communications. In 3G/4G cellular networks, RACH congestion not only leads to collisions, retransmissions and increased RACH delays, but also has the potential to disrupt the dedicated traffic flow by increasing the interference levels (3G CDMA). In order to overcome this problem, in this paper we propose a Time Hierarchical Scheme (THS) that reduces the intensity of power outage data flooding and power outage reporting delay by 6/7th, and 17/18th when compared to their respective values without THS. Also, we propose an Optimum Transmission Rate Adaptive (OTRA) MAC to optimize the latency in power outage data collection. The analysis and simulation results presented in this paper show that both the OTRA and THS features of the proposed MAC results in a Power Outage Data Collection Latency (PODCL) that is 1/10th of the 4G LTE PODCL.

  15. Storage Performance Virtualization via Throughput and Latency Control Jianyong Zhang Alma Riska Anand Sivasubramaniam Qian Wang Erik Riedel

    E-Print Network [OSTI]

    Riska, Alma

    Storage Performance Virtualization via Throughput and Latency Control Jianyong Zhang Alma Riska and managing storage systems. A consequence of this trend is the need to serve multiple users that can be built on top of an existing storage utility. This frame- work uses a low-level feedback

  16. IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 53, NO. 10, OCTOBER 2006 2015 Latency Detection in Motor Responses

    E-Print Network [OSTI]

    Ramat, Stefano

    are one symptom of Parkinson's disease [2]. Latency is defined as the period of time between the intro in Motor Responses: A Model-Based Approach With Genetic Algorithm Optimization Stefano Ramat*, Member, IEEE-valued genetic algorithm, allowing to avoid trapping in local, suboptimal minima. The use of this approach allows

  17. Results & Conclusions SPECInt 2000. 4 way. 32 IQ entries. 128 ROB. 64 LSQ. Baseline: 2-cycle Scheduling Loop latency

    E-Print Network [OSTI]

    Morancho, Enric

    -cycle Scheduling Loop latency Ideal (1 cycle) Our Proposal Our proposal & fusion Speculative Wakeup-mcf Speed-up over Baseline Baseline with Double IQ size (64 IQ entries) Baseline & fusion We have proposed two previously proposed speculative schedulers Conclusions References [Star00] J. Stark et al

  18. Int. J. Ad Hoc and Ubiquitous Computing, Vol. , No. , 2012 1 Worst-case Latency of Broadcast in Intermittently

    E-Print Network [OSTI]

    Int. J. Ad Hoc and Ubiquitous Computing, Vol. , No. , 2012 1 Worst-case Latency of Broadcast one year as a Research Fellow at Trinity College Dubin. He received his MSc degree in computer science and engi- neering in 2005 and his PhD in computer science in 2011 both from Link¨oping University. His Ph

  19. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  20. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  1. Sandia Energy - PV Systems Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    studies such as Accelerated Life Testing (ALT) and Failure Modes and Effects Analysis (FMEA). SNL has also partnered with a utility to create a data-driven Reliability Block...

  2. Reliability and Competitive Electricity Markets

    E-Print Network [OSTI]

    Joskow, Paul; Tirole, Jean

    2006-03-14

    Deregulation of the electricity sector has resulted in conflict between the economic aims of creating competitive wholesale and retail markets, and an engineering focus on reliability of supply. The paper starts by deriving the optimal prices...

  3. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  4. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  5. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  6. NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL: Preliminary Disturbance...

    Energy Savers [EERE]

    Report More Documents & Publications North American Electric Reliability Council Power Outage Update North American Electric Reliability Council Outage Announcement Electric System...

  7. Distributed Generation Operational Reliability, Executive Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reliability, Executive Summary Report, January 2004 Distributed Generation Operational Reliability, Executive Summary Report, January 2004 This report summarizes the results of the...

  8. Distributed Generation Operational Reliability and Availability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reliability and Availability Database, Final Report, January 2004 Distributed Generation Operational Reliability and Availability Database, Final Report, January 2004 This final...

  9. Recommendations to Address Power Reliability Concerns Raised...

    Office of Environmental Management (EM)

    to Address Power Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns...

  10. Sandia Energy - Continuous Reliability Enhancement for Wind ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Continuous Reliability Enhancement for Wind (CREW): Project Update Home Renewable Energy Energy News Wind Energy News & Events Systems Analysis Continuous Reliability Enhancement...

  11. NREL Publishes Gearbox Reliability Collaborative Findings Report...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Publishes Gearbox Reliability Collaborative Findings Report NREL Publishes Gearbox Reliability Collaborative Findings Report October 3, 2011 - 12:56pm Addthis This is an excerpt...

  12. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  13. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  14. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  15. Low latency, high bandwidth data communications between compute nodes in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2010-11-02

    Methods, parallel computers, and computer program products are disclosed for low latency, high bandwidth data communications between compute nodes in a parallel computer. Embodiments include receiving, by an origin direct memory access (`DMA`) engine of an origin compute node, data for transfer to a target compute node; sending, by the origin DMA engine of the origin compute node to a target DMA engine on the target compute node, a request to send (`RTS`) message; transferring, by the origin DMA engine, a predetermined portion of the data to the target compute node using memory FIFO operation; determining, by the origin DMA engine whether an acknowledgement of the RTS message has been received from the target DMA engine; if the an acknowledgement of the RTS message has not been received, transferring, by the origin DMA engine, another predetermined portion of the data to the target compute node using a memory FIFO operation; and if the acknowledgement of the RTS message has been received by the origin DMA engine, transferring, by the origin DMA engine, any remaining portion of the data to the target compute node using a direct put operation.

  16. LMS RELIABILITY PART APPLICATION ANALYSIS

    E-Print Network [OSTI]

    Rathbun, Julie A.

    ( LMS RELIABILITY PART APPLICATION ANALYSIS Contract No. NAS 9-5829 MO. ATM-966 PAGE 1 RIV. NO, B 3. 0 3. I 3. 2 3.3 3. 3. I 3. 3. 2 3.3.3 3. 3. 4 4. 0 PARA. NO. 1. 0 1.1 LMS RELIABILITY PART 1. 5 1. 6 1. 7 2. 0 2. 1 2. 2 2. 2. 1 2. 2. 2 2. 2. 3 2. 2. 4 -:-?· 2. ,5 2. 3 2. 3. 1 LMS

  17. Reliability in the design phase

    SciTech Connect (OSTI)

    Siahpush, A.S.; Hills, S.W.; Pham, H. (EG and G Idaho, Inc., Idaho Falls, ID (United States)); Majumdar, D. (USDOE Idaho Field Office, Idaho Falls, ID (United States))

    1991-12-01

    A study was performed to determine the common methods and tools that are available to calculated or predict a system's reliability. A literature review and software survey are included. The desired product of this developmental work is a tool for the system designer to use in the early design phase so that the final design will achieve the desired system reliability without lengthy testing and rework. Three computer programs were written which provide the first attempt at fulfilling this need. The programs are described and a case study is presented for each one. This is a continuing effort which will be furthered in FY-1992. 10 refs.

  18. Reliability in the design phase

    SciTech Connect (OSTI)

    Siahpush, A.S.; Hills, S.W.; Pham, H. [EG and G Idaho, Inc., Idaho Falls, ID (United States); Majumdar, D. [USDOE Idaho Field Office, Idaho Falls, ID (United States)

    1991-12-01

    A study was performed to determine the common methods and tools that are available to calculated or predict a system`s reliability. A literature review and software survey are included. The desired product of this developmental work is a tool for the system designer to use in the early design phase so that the final design will achieve the desired system reliability without lengthy testing and rework. Three computer programs were written which provide the first attempt at fulfilling this need. The programs are described and a case study is presented for each one. This is a continuing effort which will be furthered in FY-1992. 10 refs.

  19. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  20. Wind turbine reliability database update.

    SciTech Connect (OSTI)

    Peters, Valerie A.; Hill, Roger Ray; Stinebaugh, Jennifer A.; Veers, Paul S.

    2009-03-01

    This report documents the status of the Sandia National Laboratories' Wind Plant Reliability Database. Included in this report are updates on the form and contents of the Database, which stems from a fivestep process of data partnerships, data definition and transfer, data formatting and normalization, analysis, and reporting. Selected observations are also reported.

  1. Photovoltaic performance and reliability workshop

    SciTech Connect (OSTI)

    Kroposki, B.

    1996-10-01

    This proceedings is the compilation of papers presented at the ninth PV Performance and Reliability Workshop held at the Sheraton Denver West Hotel on September 4--6, 1996. This years workshop included presentations from 25 speakers and had over 100 attendees. All of the presentations that were given are included in this proceedings. Topics of the papers included: defining service lifetime and developing models for PV module lifetime; examining and determining failure and degradation mechanisms in PV modules; combining IEEE/IEC/UL testing procedures; AC module performance and reliability testing; inverter reliability/qualification testing; standardization of utility interconnect requirements for PV systems; need activities to separate variables by testing individual components of PV systems (e.g. cells, modules, batteries, inverters,charge controllers) for individual reliability and then test them in actual system configurations; more results reported from field experience on modules, inverters, batteries, and charge controllers from field deployed PV systems; and system certification and standardized testing for stand-alone and grid-tied systems.

  2. 2012 Reliability & Markets Peer Review | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reliability & Markets Peer Review 2012 Reliability & Markets Peer Review The Transmission Reliability R&D Reliability & Markets Peer Review included 11 presentations over 2 days on...

  3. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  4. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  5. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  6. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  7. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  8. FORMAL SEMANTICS AND VERIFICATION OF DYNAMIC RELIABILITY BLOCK DIAGRAMS FOR SYSTEM RELIABILITY MODELING

    E-Print Network [OSTI]

    Xu, Haiping

    that DRBD provides a powerful tool for system reliability modeling, and our proposed verification approachFORMAL SEMANTICS AND VERIFICATION OF DYNAMIC RELIABILITY BLOCK DIAGRAMS FOR SYSTEM RELIABILITY-scale computer-based systems. KEY WORDS Reliability modeling, dynamic reliability block diagrams (DRBD), Object

  9. Secure Processing On-Chip Hsien-Hsin S. Lee Santosh Pande

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Secure Processing On-Chip Hsien-Hsin S. Lee Santosh Pande School of Electrical and Computer Engineering College of Computing Georgia Institute of Technology Georgia Institute of Technology Atlanta, GA and damage pipes or kill pets during winter times. To provide reliable security for these devices to combat

  10. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect (OSTI)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  11. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  12. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  13. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  14. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  15. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  16. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  17. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  18. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  19. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  20. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  1. Cyber security analysis testbed : combining real, emulation, and simulation.

    SciTech Connect (OSTI)

    Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

    2010-07-01

    Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

  2. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    appropriate security indices for the natural gas sector. Insecurity in the electricity sector, a primary emphasis in natural gas

  3. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    appropriate security indices for the natural gas sector. Insecurity in the electricity sector, a primary emphasis in natural gas

  4. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  5. Arnold Schwarzenegger REAL-TIME GRID RELIABILITY

    E-Print Network [OSTI]

    Energy Research (PIER) California Energy Commission Beth Chambers Contract Manager Jamie Patterson (VSA) prototype to monitor system voltage conditions and provide real time dispatchers with reliabilityArnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT California ISO Real

  6. Electric Power Reliability in Chemical Plants 

    E-Print Network [OSTI]

    Cross, M. B.

    1989-01-01

    at plants across the country? Has the quality and reliability of utility-generated power deteriorated over the past five or ten years? Or, has the perception of what constitutes reliable power changed with the advent, installation, and increasing usage...

  7. Sandia Energy - PV Reliability & Performance Model

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Model PV Reliability & Performance ModelTara Camacho-Lopez2015-06-01T20:13:00+00:00 This Web Demo model is a simplified "player" version of the Photovoltaic Reliability Performance...

  8. SELECTING TRAVEL RELIABILITY MEASURES David Schrank

    E-Print Network [OSTI]

    SELECTING TRAVEL RELIABILITY MEASURES by Tim Lomax David Schrank Shawn Turner Texas Transportation Administration provided technical resource staff persons who identified the need for a reliability measure, California Department of Transportation Tim Baker, Colorado Department of Transportation Gordon Morgan

  9. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  10. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  11. Reliability-based casing design

    SciTech Connect (OSTI)

    Maes, M.A. [Univ. of Calgary, Alberta (Canada). Civil Engineering Dept.; Gulati, K.C.; Johnson, R.C. [Mobil Research and Development Corp., Dallas, TX (United States); McKenna, D.L. [Mobil Producing Nigeria, Lagos (Nigeria); Brand, P.R.; Lewis, D.B. [Mobil E and P Technical Center, Dallas, TX (United States)

    1995-06-01

    The present paper describes the development of reliability-based design criteria for oil and/or gas well casing/tubing. The approach is based on the fundamental principles of limit state design. Limit states for tubulars are discussed and specific techniques for the stochastic modeling of loading and resistance variables are described. Zonation methods and calibration techniques are developed which are geared specifically to the characteristic tubular design for both hydrocarbon drilling and production applications. The application of quantitative risk analysis to the development of risk-consistent design criteria is shown to be a major and necessary step forward in achieving more economic tubular design.

  12. Sandia Energy - PV Systems Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy &WaterNew CREWOnline AbstractsSystems Reliability

  13. DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani Miguel Correia Bruno Quaresma Fernando Andre Paulo Sousa

    E-Print Network [OSTI]

    Correia, Miguel

    DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani Miguel Correia Bruno of critical data that could be moved to the cloud. However, the reliability and security of data stored, Security Keywords Cloud computing, Cloud storage, Byzantine quorum systems 1. Introduction The increasing

  14. THE SECURITY-CONSTRAINED COMMITMENT AND DISPATCH FOR MIDWEST ISO DAY-AHEAD CO-OPTIMIZED ENERGY AND ANCILLARY SERVICE MARKET

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    improve grid reliability. Key words ­ Electricity market, LMP, Security Constrained Unit Commitment (SCUCTHE SECURITY-CONSTRAINED COMMITMENT AND DISPATCH FOR MIDWEST ISO DAY-AHEAD CO-OPTIMIZED ENERGY ­ This paper reports upon the security-constrained commitment and dispatch algorithms and their implementation

  15. LUNAR MASS SPECTROMETER RELIABILITY LOGIC DIAGRAM

    E-Print Network [OSTI]

    Rathbun, Julie A.

    point (A) to (F). The block diagram also defines the reliability functions for the purpose of FMEA 1

  16. Reliability Challenges for Solar Energy (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.

    2009-12-08

    Presentation that reviews reliability issues related to various types of photovoltaic tecnnologies, including crystalline silicon, thin films, and concentrating PV.

  17. Dispatcher Reliability Analysis : SPICA-RAIL Experiments

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    consider that humans are fully reliable. But experience shows that many accidents involve human failuresDispatcher Reliability Analysis : SPICA-RAIL Experiments Fabien Belmonte, Jean-Louis Boulanger of scenarios and evaluate the behaviour of human operators. A state of the art in human reliability is pre

  18. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  19. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  20. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  1. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  2. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  3. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  4. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  5. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  6. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  7. College of Electricity Delivery and Energy Reliability | Department...

    Energy Savers [EERE]

    Electricity Delivery and Energy Reliability College of Electricity Delivery and Energy Reliability College of Electricity Delivery and Energy Reliability Vision OE recognizes that...

  8. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  9. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  10. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  11. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  12. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  13. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  14. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  15. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  16. National Center for Nuclear Security - NCNS

    ScienceCinema (OSTI)

    None

    2015-01-09

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  17. National Center for Nuclear Security - NCNS

    SciTech Connect (OSTI)

    2014-11-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  18. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  19. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  20. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  1. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  2. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  3. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  4. MEMS reliability in shock environments

    SciTech Connect (OSTI)

    TANNER,DANELLE M.; WALRAVEN,JEREMY A.; HELGESEN,KAREN SUE; IRWIN,LLOYD W.; BROWN,FREDERICK A.; SMITH,NORMAN F.; MASTERS,NATHAN

    2000-02-09

    In order to determine the susceptibility of the MEMS (MicroElectroMechanical Systems) devices to shock, tests were performed using haversine shock pulses with widths of 1 to 0.2 ms in the range from 500g to 40,000g. The authors chose a surface-micromachined microengine because it has all the components needed for evaluation: springs that flex, gears that are anchored, and clamps and spring stops to maintain alignment. The microengines, which were unpowered for the tests, performed quite well at most shock levels with a majority functioning after the impact. Debris from the die edges moved at levels greater than 4,000g causing shorts in the actuators and posing reliability concerns. The coupling agent used to prevent stiction in the MEMS release weakened the die-attach bond, which produced failures at 10,000g and above. At 20,000g the authors began to observe structural damage in some of the thin flexures and 2.5-micron diameter pin joints. The authors observed electrical failures caused by the movement of debris. Additionally, they observed a new failure mode where stationary comb fingers contact the ground plane resulting in electrical shorts. These new failure were observed in the control group indicating that they were not shock related.

  5. Evaluation of MHTGR fuel reliability

    SciTech Connect (OSTI)

    Wichner, R.P. [Oak Ridge National Lab., TN (United States); Barthold, W.P. [Barthold Associates, Inc., Knoxville, TN (United States)

    1992-07-01

    Modular High-Temperature Gas-Cooled Reactor (MHTGR) concepts that house the reactor vessel in a tight but unsealed reactor building place heightened importance on the reliability of the fuel particle coatings as fission product barriers. Though accident consequence analyses continue to show favorable results, the increased dependence on one type of barrier, in addition to a number of other factors, has caused the Nuclear Regulatory Commission (NRC) to consider conservative assumptions regarding fuel behavior. For this purpose, the concept termed ``weak fuel`` has been proposed on an interim basis. ``Weak fuel`` is a penalty imposed on consequence analyses whereby the fuel is assumed to respond less favorably to environmental conditions than predicted by behavioral models. The rationale for adopting this penalty, as well as conditions that would permit its reduction or elimination, are examined in this report. The evaluation includes an examination of possible fuel-manufacturing defects, quality-control procedures for defect detection, and the mechanisms by which fuel defects may lead to failure.

  6. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  7. Real Time Grid Reliability Management 2005

    E-Print Network [OSTI]

    Eto, Joe

    2008-01-01

    W.R. Schmus, D.C. Dawson, “Transmission Voltage RecoveryEnhancing AC-DC Power System Transmission Reliability and

  8. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    various fuels and energy supply systems. Acknowledgements WeAssessing Reliability in Energy Supply Systems Ryan W.stability of many energy supply regions becomes more

  9. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    various fuels and energy supply systems. Acknowledgements WeAssessing Reliability in Energy Supply Systems Ryan W.stability of many energy supply regions becomes more

  10. Smart Grid Investments Improve Grid Reliability, Resilience,...

    Energy Savers [EERE]

    customers, and improve overall service reliability to reduce customer losses from power disruptions. This report presents findings on smart grid improvements in outage...

  11. Information Concerning Reliability Impacts under Various System...

    Broader source: Energy.gov (indexed) [DOE]

    of sentence redacted) In addition, there is a discussion concerning the impacts of demand side response in addressing this situation. Information Concerning Reliability...

  12. Comments of North American Electric Reliability Corporation ...

    Office of Environmental Management (EM)

    RFI. North American Electric Reliability Corporation (NERC) More Documents & Publications City Utilities of Springfield Missouri Comments on Smart Grid RFI: Addressing Policy and...

  13. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  14. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  15. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  16. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  17. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  18. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  19. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  20. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  1. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  3. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  4. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  5. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  6. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  7. Fundamental mechanisms of micromachine reliability

    SciTech Connect (OSTI)

    DE BOER,MAARTEN P.; SNIEGOWSKI,JEFFRY J.; KNAPP,JAMES A.; REDMOND,JAMES M.; MICHALSKE,TERRY A.; MAYER,THOMAS K.

    2000-01-01

    Due to extreme surface to volume ratios, adhesion and friction are critical properties for reliability of Microelectromechanical Systems (MEMS), but are not well understood. In this LDRD the authors established test structures, metrology and numerical modeling to conduct studies on adhesion and friction in MEMS. They then concentrated on measuring the effect of environment on MEMS adhesion. Polycrystalline silicon (polysilicon) is the primary material of interest in MEMS because of its integrated circuit process compatibility, low stress, high strength and conformal deposition nature. A plethora of useful micromachined device concepts have been demonstrated using Sandia National Laboratories' sophisticated in-house capabilities. One drawback to polysilicon is that in air the surface oxidizes, is high energy and is hydrophilic (i.e., it wets easily). This can lead to catastrophic failure because surface forces can cause MEMS parts that are brought into contact to adhere rather than perform their intended function. A fundamental concern is how environmental constituents such as water will affect adhesion energies in MEMS. The authors first demonstrated an accurate method to measure adhesion as reported in Chapter 1. In Chapter 2 through 5, they then studied the effect of water on adhesion depending on the surface condition (hydrophilic or hydrophobic). As described in Chapter 2, they find that adhesion energy of hydrophilic MEMS surfaces is high and increases exponentially with relative humidity (RH). Surface roughness is the controlling mechanism for this relationship. Adhesion can be reduced by several orders of magnitude by silane coupling agents applied via solution processing. They decrease the surface energy and render the surface hydrophobic (i.e. does not wet easily). However, only a molecular monolayer coats the surface. In Chapters 3-5 the authors map out the extent to which the monolayer reduces adhesion versus RH. They find that adhesion is independent of RH up to a threshold value, depending on the coating chemistry. The mechanism for the adhesion increase beyond this threshold value is that the coupling agent reconfigures from a surface to a bulk phase (Chapter 3). To investigate the details of how the adhesion increase occurs, the authors developed the mechanics for adhesion hysteresis measurements. These revealed that near-crack tip compression is the underlying cause of the adhesion increase (Chapter 4). A vacuum deposition chamber for silane coupling agent deposition was constructed. Results indicate that vapor deposited coatings are less susceptible to degradation at high RH (Chapter 5). To address issues relating to surfaces in relative motion, a new test structure to measure friction was developed. In contrast to other surface micromachined friction test structures, uniform apparent pressure is applied in the frictional contact zone (Chapter 6). The test structure will enable friction studies over a large pressure and dynamic range. In this LDRD project, the authors established an infrastructure for MEMS adhesion and friction metrology. They then characterized in detail the performance of hydrophilic and hydrophobic films under humid conditions, and determined mechanisms which limit this performance. These studies contribute to a fundamental understanding for MEMS reliability design rules. They also provide valuable data for MEMS packaging requirements.

  8. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  9. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  10. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  11. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  12. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  13. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  14. Software Reliability Cases: The Bridge Between Hardware, Software and System Safety and Reliability

    SciTech Connect (OSTI)

    Herrmann, D.S.; Peercy, D.E.

    1999-01-08

    High integrity/high consequence systems must be safe and reliable; hence it is only logical that both software safety and software reliability cases should be developed. Risk assessments in safety cases evaluate the severity of the consequences of a hazard and the likelihood of it occurring. The likelihood is directly related to system and software reliability predictions. Software reliability cases, as promoted by SAE JA 1002 and 1003, provide a practical approach to bridge the gap between hardware reliability, software reliability, and system safety and reliability by using a common methodology and information structure. They also facilitate early insight into whether or not a project is on track for meeting stated safety and reliability goals, while facilitating an informed assessment by regulatory and/or contractual authorities.

  15. R&D program benefits estimation: DOE Office of Electricity Delivery and Energy Reliability

    SciTech Connect (OSTI)

    None, None

    2006-12-04

    The overall mission of the U.S. Department of Energy’s Office of Electricity Delivery and Energy Reliability (OE) is to lead national efforts to modernize the electric grid, enhance the security and reliability of the energy infrastructure, and facilitate recovery from disruptions to the energy supply. In support of this mission, OE conducts a portfolio of research and development (R&D) activities to advance technologies to enhance electric power delivery. Multiple benefits are anticipated to result from the deployment of these technologies, including higher quality and more reliable power, energy savings, and lower cost electricity. In addition, OE engages State and local government decision-makers and the private sector to address issues related to the reliability and security of the grid, including responding to national emergencies that affect energy delivery. The OE R&D activities are comprised of four R&D lines: High Temperature Superconductivity (HTS), Visualization and Controls (V&C), Energy Storage and Power Electronics (ES&PE), and Distributed Systems Integration (DSI).

  16. Understanding the Critical Path in Power State Transition Latencies Sam (Likun) Xi, Marisabel Guevara, Jared Nelson, Patrick Pensabene, and Benjamin C. Lee

    E-Print Network [OSTI]

    Lee, Benjamin C.

    .c.lee@duke.edu Abstract--Increasing demands on datacenter com- puting prompts research in energy-efficient warehouse scale resume sequences to make datacenter server activation viable. With fast transitions, server activation--Transition latency, suspend, sleep, Chrome OS, power consumption, datacenter I. INTRODUCTION Datacenter power

  17. 978-1-4799-4394-4/14/$31.00 c 2014 IEEE Towards Energy Proportionality for Large-Scale Latency-Critical Workloads

    E-Print Network [OSTI]

    Kozyrakis, Christos

    978-1-4799-4394-4/14/$31.00 c 2014 IEEE Towards Energy Proportionality for Large-Scale Latency University Google, Inc. Abstract Reducing the energy footprint of warehouse-scale computer (WSC) systems is key to their affordability, yet difficult to achieve in practice. The lack of energy proportionality

  18. Reducing Damage Assessment Latency in Survivable Indrakshi Ray1, Ross M. McConnell1, Monte Lunacek1, and Vijay Kumar2

    E-Print Network [OSTI]

    Ray, Indrakshi

    Reducing Damage Assessment Latency in Survivable Databases Indrakshi Ray1, Ross M. McConnell1 on other data items can help spread the damage. To prevent the damage from spreading, it is important to assess the damage and confine it as quickly as possible. Algorithms providing fast damage assessment

  19. Abstract --The central performance problem in the World Wide Web, in recent years, is user perceived latency. This is the time

    E-Print Network [OSTI]

    Levy, Hanoch

    1 Abstract -- The central performance problem in the World Wide Web, in recent years, is user perceived latency. This is the time spent by a user while waiting for a Web page he/she requested. Im- patience with poor performance is the most common reason visitors terminate their visit at Web sites. For e

  20. Advances in Safety, Reliability and Risk Management -Proceedings of the European Safety and Reliability Conference, ESREL 2011 -European Safety and Reliability Conference: Advances in Safety, Reliability and

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Advances in Safety, Reliability and Risk Management - Proceedings of the European Safety, Reliability and Risk Management, ESREL 2011, Troyes : France (2011) In France, more than 99% of failed is global risk management. This allows analysis of the major risks faced by the busi- ness (loss

  1. Reliability Meets Big Data: Opportunities and Challenges

    E-Print Network [OSTI]

    McCalley, James D.

    Reliability Meets Big Data: Opportunities and Challenges William Q. Meeker Department of Statistics maintenance operations. 1.2 Examples of systems providing big data Some examples of particular systems 1, 2013 Abstract Reliability field data such as that obtained from warranty claims and maintenance

  2. RELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION

    E-Print Network [OSTI]

    Beckermann, Christoph

    , shrinkage porosity in the casting. Despite the power and promise of these developments in casting processRELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION Richard Hardin1 , K.K. Choi1 , and Christoph 52242-1527 Keywords: Casting Process Design, Optimization, Reliability-Based Design Optimization

  3. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  4. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  5. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  6. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  7. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  8. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  9. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  10. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  11. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  12. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  13. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  14. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  16. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  17. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  18. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  19. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  20. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  1. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  2. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  3. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  4. Reliability of Coupled Oscillators II: Larger Networks

    E-Print Network [OSTI]

    Kevin K. Lin; Eric Shea-Brown; Lai-Sang Young

    2007-08-23

    We study the reliability of phase oscillator networks in response to fluctuating inputs. Reliability means that an input elicits essentially identical responses upon repeated presentations, regardless of the network's initial condition. In this paper, we extend previous results on two-cell networks to larger systems. The first issue that arises is chaos in the absence of inputs, which we demonstrate and interpret in terms of reliability. We give a mathematical analysis of networks that can be decomposed into modules connected by an acyclic graph. For this class of networks, we show how to localize the source of unreliability, and address questions concerning downstream propagation of unreliability once it is produced.

  5. MEMS reliability: The challenge and the promise

    SciTech Connect (OSTI)

    Miller, W.M.; Tanner, D.M.; Miller, S.L.; Peterson, K.A.

    1998-05-01

    MicroElectroMechanical Systems (MEMS) that think, sense, act and communicate will open up a broad new array of cost effective solutions only if they prove to be sufficiently reliable. A valid reliability assessment of MEMS has three prerequisites: (1) statistical significance; (2) a technique for accelerating fundamental failure mechanisms, and (3) valid physical models to allow prediction of failures during actual use. These already exist for the microelectronics portion of such integrated systems. The challenge lies in the less well understood micromachine portions and its synergistic effects with microelectronics. This paper presents a methodology addressing these prerequisites and a description of the underlying physics of reliability for micromachines.

  6. Protecting a University's Wireless Data Network with the WPA and VPN Security Solutions

    E-Print Network [OSTI]

    Saksupakul, Rattanachai

    2007-05-18

    integrity and confidentiality to users and clients. A VPN gateway is the primary network element that provides a virtual, secure connection between the users or clients and servers. VPN tunneling protocols and cryptographic algorithms are fundamentally... increases security and reliability of the network with its sophisticated tunneling protocols and encryption software. Increasingly, the VPN technology has been widely implemented wireless data networks in order to maximize confidentiality, data integrity...

  7. PV Module Reliability Research (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-06-01

    This National Center for Photovoltaics sheet describes the capabilities of its PV module reliability research. The scope and core competencies and capabilities are discussed and recent publications are listed.

  8. RELIABILITY PLANNING IN DISTRIBUTED ELECTRIC ENERGY SYSTEMS

    E-Print Network [OSTI]

    Kahn, E.

    2011-01-01

    Edward, Reliability of Wind Power from Dispersed Sites:The same is true for wind power. This Even over hundreds ofof (11) also shows how wind power output distributi.on

  9. Reliability of copper interconnects in integrated circuits

    E-Print Network [OSTI]

    Choi, Zung-Sun

    2007-01-01

    As dimensions shrink and current densities increase, the reliability of metal interconnects becomes a serious concern. In copper interconnects, the dominant diffusion path is along the interface between the copper and the ...

  10. Reliable Distributed Computing for Decision Support Systems

    E-Print Network [OSTI]

    Bargiela, Andrzej

    of pipes and network nodes spread over a large geographical area, calls for a control of computational system it is serv- icing. Addressing the reliability issues of dis- tributed systems involves tackling

  11. Reliability Issues for Photovoltaic Modules (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.

    2009-10-01

    Si modules good in field; new designs need reliability testing. CdTe & CIGS modules sensitive to moisture; carefully seal. CPV in product development stage; benefits from expertise in other industries.

  12. Reliability Challenges for Solar Energy (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.

    2009-04-27

    PV industry can benefit from reliability testing experience of microelectronics industry . Si modules perform well in field; CdTe/CIGS must be sealed to moisture; CPV in product development stage.

  13. Demand Response For Power System Reliability: FAQ

    SciTech Connect (OSTI)

    Kirby, Brendan J [ORNL

    2006-12-01

    Demand response is the most underutilized power system reliability resource in North America. Technological advances now make it possible to tap this resource to both reduce costs and improve. Misconceptions concerning response capabilities tend to force loads to provide responses that they are less able to provide and often prohibit them from providing the most valuable reliability services. Fortunately this is beginning to change with some ISOs making more extensive use of load response. This report is structured as a series of short questions and answers that address load response capabilities and power system reliability needs. Its objective is to further the use of responsive load as a bulk power system reliability resource in providing the fastest and most valuable ancillary services.

  14. Gearbox Reliability Collaborative (GRC) Description and Loading

    SciTech Connect (OSTI)

    Oyague, F.

    2011-11-01

    This document describes simulated turbine load cases in accordance to the IEC 61400-1 Ed.3 standard, which is representative of the typical wind turbine design process. The information presented herein is intended to provide a broad understanding of the gearbox reliability collaborative 750kW drivetrain and turbine configuration. In addition, fatigue and ultimate strength drivetrain loads resulting from simulations are presented. This information provides the bases for the analytical work of the gearbox reliability collaborative effort.

  15. System Reliability for LED-Based Products

    SciTech Connect (OSTI)

    Davis, J Lynn; Mills, Karmann; Lamvik, Michael; Yaga, Robert; Shepherd, Sarah D; Bittle, James; Baldasaro, Nick; Solano, Eric; Bobashev, Georgiy; Johnson, Cortina; Evans, Amy

    2014-04-07

    Results from accelerated life tests (ALT) on mass-produced commercially available 6” downlights are reported along with results from commercial LEDs. The luminaires capture many of the design features found in modern luminaires. In general, a systems perspective is required to understand the reliability of these devices since LED failure is rare. In contrast, components such as drivers, lenses, and reflector are more likely to impact luminaire reliability than LEDs.

  16. Dormant storage reliability assessments-data based

    SciTech Connect (OSTI)

    Merren, G.T.

    1981-01-01

    A relatively large amount of data pertaining to the performance of certain electronic parts after long periods of dormant storage has been collected and analyzed by the Reliability Department of Sandia National Laboratories. The failure models used by Sandia are presented and reliability assessments for selected electronic parts derived from these models and the measured performance data are provided. These data based assessments are compared to similar assessments derived from handbook calculations using the general data and models provided in the handbooks.

  17. WEBCASRE: A WEBBASED TOOL FOR SOFTWARE RELIABILITY MODELING

    E-Print Network [OSTI]

    Lyu, Michael R.

    of overall system reliability. This trend makes the estimation of software reliability more and more critical to most large­scale projects in their reliability engineering aspects. Traditionally, software reliabilityWEB­CASRE: A WEB­BASED TOOL FOR SOFTWARE RELIABILITY MODELING Michael R. Lyu \\Lambda JË?urgen Sch

  18. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  19. Effective Ways of Secure, Private and Trusted Cloud Computing

    E-Print Network [OSTI]

    Kumar, Pardeep; Chauhan, Durg Singh; Gupta, P K; Diwakar, Manoj

    2011-01-01

    Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications. In this paper we assess how can cloud providers earn their customers' trust and provide the security, privacy and reliability, when a third party is processing sensitive data in a remote machine located in various countries? A concept of utility cloud has been represented to provide the various services to the users. Emerging technologies can help address the challenges of Security, Privacy and Trust in cloud computing.

  20. Measurement Practices for Reliability and Power Quality

    SciTech Connect (OSTI)

    Kueck, JD

    2005-05-06

    This report provides a distribution reliability measurement ''toolkit'' that is intended to be an asset to regulators, utilities and power users. The metrics and standards discussed range from simple reliability, to power quality, to the new blend of reliability and power quality analysis that is now developing. This report was sponsored by the Office of Electric Transmission and Distribution, U.S. Department of Energy (DOE). Inconsistencies presently exist in commonly agreed-upon practices for measuring the reliability of the distribution systems. However, efforts are being made by a number of organizations to develop solutions. In addition, there is growing interest in methods or standards for measuring power quality, and in defining power quality levels that are acceptable to various industries or user groups. The problems and solutions vary widely among geographic areas and among large investor-owned utilities, rural cooperatives, and municipal utilities; but there is still a great degree of commonality. Industry organizations such as the National Rural Electric Cooperative Association (NRECA), the Electric Power Research Institute (EPRI), the American Public Power Association (APPA), and the Institute of Electrical and Electronics Engineers (IEEE) have made tremendous strides in preparing self-assessment templates, optimization guides, diagnostic techniques, and better definitions of reliability and power quality measures. In addition, public utility commissions have developed codes and methods for assessing performance that consider local needs. There is considerable overlap among these various organizations, and we see real opportunity and value in sharing these methods, guides, and standards in this report. This report provides a ''toolkit'' containing synopses of noteworthy reliability measurement practices. The toolkit has been developed to address the interests of three groups: electric power users, utilities, and regulators. The report will also serve to support activities to develop and share information among industry and regulatory participants about critical resources and practices. The toolkit has been developed by investigating the status of indices and definitions, surveying utility organizations on information sharing, and preparing summaries of reliability standards and monitoring requirements--the issues, needs, work under way, existing standards, practices and guidelines--for the following three classifications: (1) terms and definitions of reliability; (2) power quality standards, guidelines, and measurements; and (3) activities and organizations developing and sharing information on distribution reliability. As these synopses of reliability measurement practices are provided, it must be noted that an economic penalty may be associated with requiring too high a reliability level from the distribution system for all customers. It may be appropriate for the distribution system to supply only some base, generally accepted level of reliability. This base level would be adequate for the majority of customers. Users who need a higher level may find it economical to supply using distributed energy resources (DER) and other local solutions to reliability and power quality needs. Local solutions implemented by the customer may be the most cost-effective method for addressing the more stringent needs of a digital economy. These local solutions include energy storage, small distributed generators, and microgrids. This report also considers the market's role in addressing reliability issues and requirements. The customer's needs are discussed in view of issues such as power quality requirements of digital electronic equipment, the cost of outages, the cost of storage and new infrastructure, and natural gas prices. The market role in addressing these issues and requirements is explored. The economic considerations associated with the reliability issues are discussed, as well as the levels at which these economic decisions could be made. Finally, a discussion is provided of the role DER could play in addressing

  1. Low latency search for Gravitational waves from BH-NS binaries in coincidence with Short Gamma Ray Bursts

    E-Print Network [OSTI]

    Andrea Maselli; Valeria Ferrari

    2014-02-24

    We propose a procedure to be used in the search for gravitational waves from black hole-neutron star coalescing binaries, in coincidence with short gamma-ray bursts. It is based on two recently proposed semi-analytic fits, one reproducing the mass of the remnant disk surrounding the black hole which forms after the merging as a function of some binary parameters, the second relating the neutron star compactness, i.e. the ratio of mass and radius, with its tidal deformability. Using a Fisher matrix analysis and the two fits, we assign a probability that the emitted gravitational signal is associated to the formation of an accreting disk massive enough to supply the energy needed to power a short gamma ray burst. This information can be used in low-latency data analysis to restrict the parameter space searching for gravitational wave signals in coincidence with short gamma-ray bursts, and to gain information on the dynamics of the coalescing system and on the internal structure of the components. In addition, when the binary parameters will be measured with high accuracy, it will be possible to use this information to trigger the search for off-axis gamma-ray bursts afterglows.

  2. Fast, multi-channel real-time processing of signals with microsecond latency using graphics processing units

    SciTech Connect (OSTI)

    Rath, N., E-mail: Nikolaus@rath.org; Levesque, J. P.; Mauel, M. E.; Navratil, G. A.; Peng, Q. [Department of Applied Physics and Applied Mathematics, Columbia University, 500 W 120th St, New York, New York 10027 (United States)] [Department of Applied Physics and Applied Mathematics, Columbia University, 500 W 120th St, New York, New York 10027 (United States); Kato, S. [Department of Information Engineering, Nagoya University, Nagoya (Japan)] [Department of Information Engineering, Nagoya University, Nagoya (Japan)

    2014-04-15

    Fast, digital signal processing (DSP) has many applications. Typical hardware options for performing DSP are field-programmable gate arrays (FPGAs), application-specific integrated DSP chips, or general purpose personal computer systems. This paper presents a novel DSP platform that has been developed for feedback control on the HBT-EP tokamak device. The system runs all signal processing exclusively on a Graphics Processing Unit (GPU) to achieve real-time performance with latencies below 8 ?s. Signals are transferred into and out of the GPU using PCI Express peer-to-peer direct-memory-access transfers without involvement of the central processing unit or host memory. Tests were performed on the feedback control system of the HBT-EP tokamak using forty 16-bit floating point inputs and outputs each and a sampling rate of up to 250 kHz. Signals were digitized by a D-TACQ ACQ196 module, processing done on an NVIDIA GTX 580 GPU programmed in CUDA, and analog output was generated by D-TACQ AO32CPCI modules.

  3. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  4. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  5. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  6. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  7. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  8. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  9. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  10. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  11. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  12. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  13. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  14. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  15. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  16. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  17. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  18. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  19. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  20. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  1. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  2. Measuring eating disorder attitudes and behaviors: a reliability generalization study 

    E-Print Network [OSTI]

    Pearson, Crystal Anne

    2009-05-15

    I used reliability generalization procedures to determine the mean score reliability of the Eating Disorder Inventory (EDI), the Eating Attitudes Test (EAT), and the Bulimia Test (BULIT). Reliability generalization is a ...

  3. Empirical Measurements of Travelers' Value of Travel Time Reliability 

    E-Print Network [OSTI]

    Danda, Santosh Rao

    2014-08-12

    empirical data to take an initial step toward understanding the importance of travel time reliability. Katy Freeway travelers face a daily choice between reliable tolled lanes and less reliable but untolled lanes. An extensive dataset of Katy Freeway travel...

  4. Owner/Operator Perspective on Reliability Customer Needs and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SERVICES AS RELIABLE AS THE SUN OwnerOperator Perspective on Reliability Customer Needs and Field Data Sandia National Laboratories Utility-Scale Grid-Tied PV Inverter Reliability...

  5. Secure Interoperable Open Smart Grid Demonstration Project

    SciTech Connect (OSTI)

    Magee, Thoman

    2014-12-31

    The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG. The SGDP enables the efficient, flexible integration of these disparate resources and lays the architectural foundations for future scalability. Con Edison assembled an SGDP team of more than 16 different project partners, including technology vendors, and participating organizations, and the Con Edison team provided overall guidance and project management. Project team members are listed in Table 1-1.

  6. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  7. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  8. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  9. Towards improving software security by using simulation to inform requirements and conceptual design

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Nutaro, James J.; Allgood, Glenn O.; Kuruganti, Teja

    2015-06-17

    We illustrate the use of modeling and simulation early in the system life-cycle to improve security and reduce costs. The models that we develop for this illustration are inspired by problems in reliability analysis and supervisory control, for which similar models are used to quantify failure probabilities and rates. In the context of security, we propose that models of this general type can be used to understand trades between risk and cost while writing system requirements and during conceptual design, and thereby significantly reduce the need for expensive security corrections after a system enters operation

  10. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  11. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  12. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  13. 770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System Design for a Secure

    E-Print Network [OSTI]

    Tolbert, Leon M.

    Design for a Secure and Reconfigurable Power Grid Hairong Qi, Senior Member, IEEE, Xiaorui Wang, Member architecture design that can help assure the security and reliability of the power grid. In this paper, we770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System

  14. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  15. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  16. The Business Case for Fuel Cells 2013: Reliability, Resiliency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Business Case for Fuel Cells 2013: Reliability, Resiliency & Savings The Business Case for Fuel Cells 2013: Reliability, Resiliency & Savings This report, compiled by Fuel...

  17. The Business Case for Fuel Cells 2013: Reliability, Resiliency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Reliability, Resiliency & Savings The Business Case for Fuel Cells 2013: Reliability, Resiliency & Savings This report, compiled by Fuel Cells 2000 with support from the Fuel...

  18. System Reliability Model for Solid-State Lighting Luminaires...

    Energy Savers [EERE]

    System Reliability Model for Solid-State Lighting Luminaires System Reliability Model for Solid-State Lighting Luminaires Lead Performer: RTI International - Research Triangle...

  19. Reliability of islanded microgrids with stochastic generation and prioritized load

    E-Print Network [OSTI]

    Marden, Mirjana Milosevic

    The potential to improve distribution system reliability is a primary motivation behind the development and deployment of microgrids. Previous studies have illustrated substantial reliability benefits of dispatchable ...

  20. Reliable estimation of biochemical parameters from C3 leafphotosynthe...

    Office of Scientific and Technical Information (OSTI)

    Reliable estimation of biochemical parameters from C3 leaf photosynthesis-intercellular carbon dioxide response curves Citation Details In-Document Search Title: Reliable...

  1. Characterizing wind power resource reliability in southern Africa...

    Office of Scientific and Technical Information (OSTI)

    DOE PAGES Search Results Published Article: Characterizing wind power resource reliability in southern Africa Title: Characterizing wind power resource reliability in southern...

  2. Washington DC Reliability Requirements and the Need to Operate...

    Energy Savers [EERE]

    DC Reliability Requirements and the Need to Operate Mirant's Potomac River Generation Station to Support Local Area Reliability (Oak Ridge National Laboratory 2005)...

  3. Effect of Jatropha based Biodiesel, on Engine Hardware Reliability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Jatropha based Biodiesel, on Engine Hardware Reliability, Emission and Performance Effect of Jatropha based Biodiesel, on Engine Hardware Reliability, Emission and Performance...

  4. CHP SYSTEM AT FOOD PROCESSING PLANT INCREASES RELIABILITY AND...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CHP SYSTEM AT FOOD PROCESSING PLANT INCREASES RELIABILITY AND REDUCES EMISSIONS - CASE STUDY, 2015 CHP SYSTEM AT FOOD PROCESSING PLANT INCREASES RELIABILITY AND REDUCES EMISSIONS -...

  5. Data Center Efficiency and IT Equipment Reliability at Wider...

    Energy Savers [EERE]

    Data Center Efficiency and IT Equipment Reliability at Wider Operating Temperature and Humidity Ranges Data Center Efficiency and IT Equipment Reliability at Wider Operating...

  6. 2013 Reliability & Markets Peer Review | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the links. The agenda and list of presentations are included below. The Reliability and Markets activity of the Transmission Reliability program researches, develops, and...

  7. Thermal Stress and Reliability for Advanced Power Electronics...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance and Reliability of Bonded Interfaces Physics of Failure of Electrical Interconnects Thermal Stress and Reliability for Advanced Power Electronics and Electric Machines...

  8. Addressing mechanical reliability issues in Sandia MEMS devices...

    Office of Scientific and Technical Information (OSTI)

    Addressing mechanical reliability issues in Sandia MEMS devices. Citation Details In-Document Search Title: Addressing mechanical reliability issues in Sandia MEMS devices. No...

  9. Office of Electricity Delivery & Energy Reliability FY 2012 Budget...

    Energy Savers [EERE]

    Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation...

  10. PV Performance and Reliability Validation Capabilities at Sandia...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PV Performance and Reliability Validation Capabilities at Sandia National Laboratories PV Performance and Reliability Validation Capabilities at Sandia National Laboratories This...

  11. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  12. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  13. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  14. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  15. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  16. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  17. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  18. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  19. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  20. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  1. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  2. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  3. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  5. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  6. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  7. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  8. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  9. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  10. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  11. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  12. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  13. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  14. ASCE Specialty Conference on Probabilistic Mechanics and Structural Reliability ESTIMATING STRUCTURAL RELIABILITY UNDER HURRICANE WIND HAZARD

    E-Print Network [OSTI]

    Balaji, Rajagopalan

    STRUCTURAL RELIABILITY UNDER HURRICANE WIND HAZARD: APPLICATIONS TO WOOD STRUCTURES Balaji Rajagopalan.frangopol@colorado.edu Abstract A stochastic nonparametric framework to estimate structural reliability under hurricane wind Natural hazards in general and hurricanes in particular, lead to loss of life and tremendous property

  15. Technique for Measuring Hybrid Electronic Component Reliability

    SciTech Connect (OSTI)

    Green, C.C.; Hernandez, C.L.; Hosking, F.M.; Robinson, D.; Rutherford, B.; Uribe, F.

    1999-01-01

    Materials compatibility studies of aged, engineered materials and hardware are critical to understanding and predicting component reliability, particularly for systems with extended stockpile life requirements. Nondestructive testing capabilities for component reliability would significantly enhance lifetime predictions. For example, if the detection of crack propagation through a solder joint can be demonstrated, this technique could be used to develop baseline information to statistically determine solder joint lifelengths. This report will investigate high frequency signal response techniques for nondestructively evaluating the electrical behavior of thick film hybrid transmission lines.

  16. Gearbox Reliability Collaborative Update: A Brief (Presentation)

    SciTech Connect (OSTI)

    Sheng, S.; Keller, J.; McDade, M.

    2012-01-01

    This presentation is an update on the Gearbox Reliability Collaborative (GRC) for the AWEA Wind Project Operations, Maintenance & Reliability Seminar. GRC accomplishments are: (1) Failure database software deployed - partners see business value for themselves and customers; (2) Designed, built, instrumented, and tested two gearboxes - (a) Generated unprecedented public domain test data from both field testing and dynamometer testing, (b) Different responses from 'identical' gearboxes, (c) Demonstrated importance of non-torque loading and modeling approach; and (3) Active collaborative, with wide industry support, leveraging DOE funding - Modeling round robin and Condition Monitoring round robin.

  17. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  18. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  19. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  20. Nevada National Security Site Groundwater Program

    ScienceCinema (OSTI)

    None

    2014-10-28

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  1. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  2. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  3. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  4. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  5. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  6. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  7. An integrated security framework for GOSS power grid analytics platform

    SciTech Connect (OSTI)

    Gibson, Tara D.; Ciraci, Selim; Sharma, Poorva; Allwardt, Craig H.; Rice, Mark J.; Akyol, Bora A.

    2014-06-23

    In power grid operations, security is an essential component for any middleware platform. Security protects data against unwanted access as well as cyber attacks. GridOpticsTM Software System (GOSS) is an open source power grid analytics platform that facilitates ease of access between applications and data sources and promotes development of advanced analytical applications. GOSS contains an API that abstracts many of the difficulties in connecting to various heterogeneous data sources. A number of applications and data sources have already been implemented to demonstrate functionality and ease of use. A security framework has been implemented which leverages widely accepted, robust JavaTM security tools in a way such that they can be interchanged as needed. This framework supports the complex fine-grained, access control rules identified for the diverse data sources already in GOSS. Performance and reliability are also important considerations in any power grid architecture. An evaluation is done to determine the overhead cost caused by security within GOSS and ensure minimal impact to performance.

  8. Improving Security in the ATLAS PanDA System

    E-Print Network [OSTI]

    Caballero, J; The ATLAS collaboration; Nilsson, P; Stewart, G; Potekhin, M; Wenaus, T

    2011-01-01

    The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common `grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is fro...

  9. Reliability and Security Analysis of Open Source Software Prasanth Anbalagan1

    E-Print Network [OSTI]

    Young, R. Michael

    these factors in analyzing open source projects. We study the characteristics of FEDORA (a popular open source the trustworthiness of open source projects. The objectives of this study is to 1. Study the characteristics of FEDORA

  10. Reliability and Security of D2D Backup Storage Systems using SATA Drives

    E-Print Network [OSTI]

    Gordon F. Hughes

    2004-01-01

    of the enterprise storage systems being backed up (which getare proposed for SATA storage system designers to achievestored removed from storage systems and unpowered, perhaps

  11. Assuring the Safety, Security, and Reliability of Medical-Device Cyber-

    E-Print Network [OSTI]

    Hu, Fei

    · Difibtech external defibrillators (2007) ­ Self-test resets low-battery status · Baxter's Colleague Infusion of adverse events associated with the use of infusion pumps - 1% deaths, 34% serious injuries - 87 infusion and Radiological Health. White Paper: Infusion Pump Improvement Initiative, April 2010 Infusion Pump Safety #12

  12. Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)Cyber Experimentation Overview Brief

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 »DigitalanDepartmentSecondarySmartCyber Experimentation

  13. Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)Fuel Duration Analysis Brief

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 »DigitalanDepartmentSecondarySmartCyber

  14. Chapter II: Increasing the Resilience, Reliability, Safety, and Asset Security of TS&D Infrastructure

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a lCaribElectricSouthApplying caulkChapter 9 of the LANL

  15. Northwest Regional Technology Center, April 2013 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    a venue for information sharing and education about cybersecurity concerns, advancements and resources Office of Electricity Delivery & Energy Reliability · Samara Moore, National Security Staff; Director is National 9-1-1 Education Month, and public organizations are working to educate the community about

  16. On The Security of Mobile Cockpit Information Systems Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast,

    E-Print Network [OSTI]

    Snoeren, Alex

    expanded to include live data such as weather and traffic information that is used to make flight decisions, information kiosks, home automation controls, and so on--our expectations of security and reliability information services supported by the receiver, the display may also include a graphical weather overlay (FIS

  17. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  18. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  19. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  20. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  1. Critical National Infrastructure Reliability Modeling and Analysis

    E-Print Network [OSTI]

    . · Telecommunications: Congestion or disruption of key communications nodes by fire, wind, water, or sabotage · Power of Homeland Security is protection of our critical national infrastructures including power, communications, transportation, and water. This paper presents models to quantify the interdependencies of critical

  2. Doctoral Defense "Structural reliability assessment under fire"

    E-Print Network [OSTI]

    Kamat, Vineet R.

    Doctoral Defense "Structural reliability assessment under fire" Qianru Guo Date: December 11, 2014 Engineering Structural safety under fire has received significant attention in recent years. Current approaches to structural fire design are based on prescriptive codes that emphasize insulation of steel

  3. The challenge of reliability in MEMS commercialization

    SciTech Connect (OSTI)

    Miller, W.M.; Tanner, D.M.; Miller, S.L.

    1998-09-01

    MicroElectroMechanical Systems (MEMS) that think, sense, act and communicate will open up a broad new array of cost-effective solutions only if MEMS is demonstrated to be sufficiently reliable. This could prove to be a major challenge if it is not addressed concurrently with technology development. There are three requirements for a valid assessment of reliability: statistical significance, identification of fundamental failure mechanisms and development of techniques for accelerating them, and valid physical models to allow prediction of failures during actual use. While these already exist for the microelectronics portion of such integrated systems, the real challenge lies in the less well-understood micromachine portions and its synergistic effects with microelectronics. This requires the elicitation of a methodology focused on MEMS reliability, which the authors discuss. A new testing and analysis infrastructure must also be developed to meet the needs of this methodology. They describe their implementation of this infrastructure and its success in addressing the three requirements for a valid reliability assessment.

  4. Reliability based casting process design optimisation

    E-Print Network [OSTI]

    Beckermann, Christoph

    , which is typically defined as an absence of, or low level of, shrinkage porosity in the casting. DespiteReliability based casting process design optimisation R. A. Hardin, K. K. Choi, N. J. Gaul and C and physical uncertainties in the casting process. In the present research, casting simulation is integrated

  5. Wind Energy Facility Reliability and Maintenance

    E-Print Network [OSTI]

    Ding, Yu

    from 18 GW to 152 GW over the past decade. According to the north American electric reliability constitute a substantial portion of the total costs of wind power production [2­4]. Field data from Germany to a few weeks. Overall, O&M costs account for 20-47.5% of the wholesale market price [4]. Considering

  6. Value-based reliability transmission planning

    SciTech Connect (OSTI)

    Dalton, J.G. III; Garrison, D.L.; Fallon, C.M.

    1996-08-01

    This paper presents a new value-based reliability planning (VBRP) process proposed for planning Duke Power Company`s (DPC) regional transmission system. All transmission served customers are fed from DPC`s regional transmission system which consists of a 44-kV predominantly radial system and a 100-kV predominantly non-radial system. In the past, any single contingency that could occur during system peak conditions and cause a thermal overload required the overloaded facility to be upgraded, regardless of the costs or the likelihood of the overload occurring. The new VBRP process is based on transmission system reliability evaluation and includes the following important elements: (1) a ten-year historical data base describing the probabilities of forced outages for lines and transformers; (2) a five-year average load duration curve describing the probability of an overload should a contingency occur; (3) a customer outage cost data base; (4) and probabilistic techniques. The new process attempts to balance the costs of improving service reliability with the benefits or value that these improvements bring to these customers. The objective is to provide the customers their required level of reliability while minimizing the Total Cost of their electric service.

  7. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  8. Feline immunodeficiency virus latency

    E-Print Network [OSTI]

    McDonnel, Samantha J; Sparger, Ellen E; Murphy, Brian G

    2013-01-01

    A simian immunodeficiency virus-infected macaque model toMC: A simian immunodeficiency virus macaque model of highlyIsolation of a T- lymphotropic virus from domestic cats with

  9. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  10. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  11. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  12. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  13. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  14. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  15. Human Reliability Analysis for Design: Using Reliability Methods for Human Factors Issues

    SciTech Connect (OSTI)

    Ronald Laurids Boring

    2010-11-01

    This paper reviews the application of human reliability analysis methods to human factors design issues. An application framework is sketched in which aspects of modeling typically found in human reliability analysis are used in a complementary fashion to the existing human factors phases of design and testing. The paper provides best achievable practices for design, testing, and modeling. Such best achievable practices may be used to evaluate and human system interface in the context of design safety certifications.

  16. Electronic logic for enhanced switch reliability

    DOE Patents [OSTI]

    Cooper, J.A.

    1984-01-20

    A logic circuit is used to enhance redundant switch reliability. Two or more switches are monitored for logical high or low output. The output for the logic circuit produces a redundant and fail-safe representation of the switch outputs. When both switch outputs are high, the output is high. Similarly, when both switch outputs are low, the logic circuit's output is low. When the output states of the two switches do not agree, the circuit resolves the conflict by memorizing the last output state which both switches were simultaneously in and produces the logical complement of this output state. Thus, the logic circuit of the present invention allows the redundant switches to be treated as if they were in parallel when the switches are open and as if they were in series when the switches are closed. A failsafe system having maximum reliability is thereby produced.

  17. Sample sizes for confidence limits for reliability.

    SciTech Connect (OSTI)

    Darby, John L.

    2010-02-01

    We recently performed an evaluation of the implications of a reduced stockpile of nuclear weapons for surveillance to support estimates of reliability. We found that one technique developed at Sandia National Laboratories (SNL) under-estimates the required sample size for systems-level testing. For a large population the discrepancy is not important, but for a small population it is important. We found that another technique used by SNL provides the correct required sample size. For systems-level testing of nuclear weapons, samples are selected without replacement, and the hypergeometric probability distribution applies. Both of the SNL techniques focus on samples without defects from sampling without replacement. We generalized the second SNL technique to cases with defects in the sample. We created a computer program in Mathematica to automate the calculation of confidence for reliability. We also evaluated sampling with replacement where the binomial probability distribution applies.

  18. Reliability Estimation for Double Containment Piping

    SciTech Connect (OSTI)

    L. Cadwallader; T. Pinna

    2012-08-01

    Double walled or double containment piping is considered for use in the ITER international project and other next-generation fusion device designs to provide an extra barrier for tritium gas and other radioactive materials. The extra barrier improves confinement of these materials and enhances safety of the facility. This paper describes some of the design challenges in designing double containment piping systems. There is also a brief review of a few operating experiences of double walled piping used with hazardous chemicals in different industries. This paper recommends approaches for the reliability analyst to use to quantify leakage from a double containment piping system in conceptual and more advanced designs. The paper also cites quantitative data that can be used to support such reliability analyses.

  19. Subsea pipeline isolation systems: Reliability and costs

    SciTech Connect (OSTI)

    Masheder, R.R.

    1996-08-01

    Since the Piper Alpha disaster, more than 80 subsea isolation systems (SSIS) have been installed in subsea gas and oil pipelines in the U.K. continental shelf at an estimated cost in the region of {Brit_pounds}500 million. The reliability and costs of these installations have now been assessed between Dec. 1992 and Oct. 1993. This assessment was based upon comprehensive reliability and cost databases which were established so that the studies could be based upon factual information in order to obtain a current status as required by the sponsoring group. The study consultants report findings have now been consolidated into a report by the UKOOA Pipeline Valve Work Group. Probabilities of failure for different types of valves and systems have been assessed and expenditures broken down and compared. The results of the studies and the conclusions drawn by UKOOA Pipeline Valve Group and the HSE Offshore Safety Division are presented in this paper.

  20. Reliability assessment of underground shaft closure

    SciTech Connect (OSTI)

    Fossum, A.F.

    1994-12-31

    The intent of the WIPP, being constructed in the bedded geologic salt deposits of Southeastern New Mexico, is to provide the technological basis for the safe disposal of radioactive Transuranic (TRU) wastes generated by the defense programs of the United States. In determining this technological basis, advanced reliability and structural analysis techniques are used to determine the probability of time-to-closure of a hypothetical underground shaft located in an argillaceous salt formation and filled with compacted crushed salt. Before being filled with crushed salt for sealing, the shaft provides access to an underground facility. Reliable closure of the shaft depends upon the sealing of the shaft through creep closure and recompaction of crushed backfill. Appropriate methods are demonstrated to calculate cumulative distribution functions of the closure based on laboratory determined random variable uncertainty in salt creep properties.

  1. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  2. Reliability Considerations from Integration of Smart Grid

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudgetFinancialReliability Considerations from the Integration

  3. Reliability of natural gas cogeneration systems

    SciTech Connect (OSTI)

    1995-12-01

    Cogeneration systems fueled by natural gas exceed the reliability of most central station power generating units, according to a study conducted by RINC Corporation for Gas Research Institute (GRI). In the study, researchers obtained operating data from 122 natural gas cogeneration units nationwide representing 2,200 megawatts (MW) of capacity and nearly 2 million hours of operating time at 37 facilities. Units were grouped into categories reflecting size (from 60 kilowatts to 100 MW), type of system (gas engine or gas turbine technology), use of emission controls, and type of thermal application. Various types and sizes of gas systems reported average availability factors ranging from 90.0 to 95.8 versus a weighted average of 85.9 percent for fossil-fuel steam, nuclear, and gas-turbine-based central station power generating units. Comparisons are based on study data and data reported by the North American Electric Reliability Council for utility power plants. Gas cogeneration can improve utility operations because as a group the relatively small, dispersed cogeneration units are more reliable than one or more large central station units of similar capacity.

  4. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  5. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  6. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  7. Extreme Scale Computing to Secure the Nation

    SciTech Connect (OSTI)

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the absence of nuclear testing, a progam to: (1) Support a focused, multifaceted program to increase the understanding of the enduring stockpile; (2) Predict, detect, and evaluate potential problems of the aging of the stockpile; (3) Refurbish and re-manufacture weapons and components, as required; and (4) Maintain the science and engineering institutions needed to support the nation's nuclear deterrent, now and in the future'. This program continues to fulfill its national security mission by adding significant new capabilities for producing scientific results through large-scale computational simulation coupled with careful experimentation, including sub-critical nuclear experiments permitted under the CTBT. To develop the computational science and the computational horsepower needed to support its mission, SBSS initiated the Accelerated Strategic Computing Initiative, later renamed the Advanced Simulation & Computing (ASC) program (sidebar: 'History of ASC Computing Program Computing Capability'). The modern 3D computational simulation capability of the ASC program supports the assessment and certification of the current nuclear stockpile through calibration with past underground test (UGT) data. While an impressive accomplishment, continued evolution of national security mission requirements will demand computing resources at a significantly greater scale than we have today. In particular, continued observance and potential Senate confirmation of the Comprehensive Test Ban Treaty (CTBT) together with the U.S administration's promise for a significant reduction in the size of the stockpile and the inexorable aging and consequent refurbishment of the stockpile all demand increasing refinement of our computational simulation capabilities. Assessment of the present and future stockpile with increased confidence of the safety and reliability without reliance upon calibration with past or future test data is a long-term goal of the ASC program. This will be accomplished through significant increases in the scientific bases that underlie the computational tools. Computer codes must be de

  8. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  9. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  10. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  11. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  12. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  13. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  14. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  15. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  16. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12