Sample records for latency reliability security

  1. PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA

    E-Print Network [OSTI]

    PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA A Thesis Submitted Technical Report TR2010-665 #12;Abstract Message authentication with low latency is necessary to ensure- tication solutions by our lab and others looked at single messages and incurred no- ticeable latency

  2. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version security, and yet incurs minimal end-to-end communication latency. Keywords: SCADA network security, bump links between devices in legacy Supervisory Con- trol And Data Acquisition (SCADA) systems, on which

  3. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide minimal end-to-end communication latency. A microcontroller prototype of our solution is under development

  4. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    Smith, Sean W.

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA) systems Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical

  5. MULTIAREA SYSTEM RELIABILITY: THE ECONOMIC EVALUATION OF SYSTEM SECURITY CRITERIA

    E-Print Network [OSTI]

    Gross, George

    MULTIAREA SYSTEM RELIABILITY: THE ECONOMIC EVALUATION OF SYSTEM SECURITY CRITERIA BY TEOMAN GULER B assessment studies and the quantification of the economics of secure power system operations security and the economics of secure operations in the competitive market environment. The advent

  6. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

  7. Security-Constrained Adequacy Evaluation of Bulk Power System Reliability

    E-Print Network [OSTI]

    Security-Constrained Adequacy Evaluation of Bulk Power System Reliability Fang Yang, Student Member. Stefopoulos, Student Member, IEEE Abstract -- A framework of security-constrained adequacy evaluation (SCAE electric load while satisfying security constraints. It encompasses three main steps: (a) critical

  8. Reliable Process for Security Policy Deployment

    E-Print Network [OSTI]

    Preda, Stere; Cuppens, Frederic; Garcia-Alfaro, Joaquin; Toutain, Laurent

    2009-01-01T23:59:59.000Z

    We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies.

  9. Secure and reliable operation of our

    E-Print Network [OSTI]

    Amin, S. Massoud

    the weather. Electric power systems constitute the fundamental infrastructure of modern society. A suc of threats: · Attacks upon the power system. In this case, the electricity infrastructure itself to national and international economy, security, and quality of life. Massoud Amin, Electric Power Research

  10. Microgrids and Heterogeneous Security, Quality, Reliability, and Availability

    E-Print Network [OSTI]

    Marnay, Chris

    2007-01-01T23:59:59.000Z

    and Energy Reliability, Distribution System Integrationand Energy Reliability, Distribution System Integration

  11. North American Electricity Infrastructure: System Security, Quality, Reliability, Availability, and Efficiency

    E-Print Network [OSTI]

    Amin, S. Massoud

    many of the complexities of electric power infrastructure and how technological innovation combined1 North American Electricity Infrastructure: System Security, Quality, Reliability, Availability for reliable and disturbance-free electricity. The massive power outages in the United States, Canada, UK

  12. Microgrids and Heterogeneous Security, Quality, Reliability, and Availability

    E-Print Network [OSTI]

    Marnay, Chris

    2007-01-01T23:59:59.000Z

    quality, reliability, and availability,” IEEE Power & EnergyReliability, and Availability Chris Marnay EnvironmentalQuality, Reliability, and Availability C. Marnay Ernest

  13. Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    1 Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid Husheng, Cookeville, TN Abstract-- Secure system state estimation is an important issue in smart grid to assure the information the- oretic perspective. The smart grid is modeled as a linear dynamic system. Then, the channel

  14. Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security

    E-Print Network [OSTI]

    Heidemann, John

    Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability is that openness and support for disclosure of future SCADA data can in improved safety, reliability, and security-network processing are needed to make greater openness and data sharing data viable. Today's SCADA systems are often

  15. Reliable fuel source | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements Recently ApprovedReliability Technology earns award Reliability

  16. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    SciTech Connect (OSTI)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19T23:59:59.000Z

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  17. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    SciTech Connect (OSTI)

    Crawford, Cary E.; de Boer, Gloria; De Castro, Kara; Landers, John; Rogers, Erin

    2010-10-01T23:59:59.000Z

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the “human factor.” Gen. Eugene Habiger, a former “Assistant Secretary for Safeguards and Security” at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that “good security is 20% equipment and 80% people.”1 Although eliminating the “human factor” is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  18. Towards Reliable Cross Sections for National Security Applications

    SciTech Connect (OSTI)

    Escher, J E; Dietrich, F S; Nobre, G A; Thompson, I J

    2011-02-24T23:59:59.000Z

    Stockpile stewardship requires the description of weapons performance without resorting to underground nuclear testing. In the earlier tests, selected isotopes were used as detectors, and recovered after irradiation. Aspects of nuclear device performance were inferred by comparing the measured isotopic ratios to those predicted from simulations. The reaction flows that produce the final isotopic distributions proceed through regions of the nuclear chart that include unstable nuclei. Presently, improved nuclear data input is required to reanalyze prior tests and to certify the stockpile's reliability and safety. Many important cross sections are unknown, as is shown in the example of the Yttrium reaction network (Figure 1). The relevant reactions include (n,2n), (n,n'), (n,gamma), (n,p) and other charged-particle emitting reactions. The cross sections have to be calculated or inferred from indirect measurements. In both cases, reliable optical models that are valid a few nucleons away from stability are needed. The UNEDF Nuclear Reaction activities address this need by combining nuclear-structure input from UNEDF structure calculations with modern reaction theory and large-scale computational capabilities to develop microscopic nucleon-nucleus optical potentials that can be extrapolated to unstable nuclei. In addition, the reaction calculation tools and optical models developed in this context are proving valuable for planning and interpreting indirect (surrogate) measurements of the required cross sections.

  19. o secure a safe, reliable and low-carbon energy future, we must alter

    E-Print Network [OSTI]

    Kammen, Daniel M.

    T o secure a safe, reliable and low- carbon energy future, we must alter both technologies and human behav- iour1 . The US Department of Energy notes2 that supply and demand is "affected as much-makers continue to focus on only one side of the energy dilemma. In the United States

  20. Interplay of Security and Reliability using Non-uniform Checkpoints Kiranmai Bellam

    E-Print Network [OSTI]

    Qin, Xiao

    .auburn.edu Department of Computer Science New Mexico Institute of Mining and Technology, Socorro, NM 87801 Department for reliability. The slack exploitation interacts in subtle ways for security in regards to the placement efficient exploitation of the total slack available in the system. This paper presents the study on the same

  1. Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of

    E-Print Network [OSTI]

    Binder, Walter

    Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications Walter Binder and Bal´azs Lichtl CoCo Software Engineering GmbH Margaretenstr. 22 applications. Mobile code is used for application upload, as well as for remote configuration and maintenance

  2. Nuclear Weapons Latency

    E-Print Network [OSTI]

    Sweeney, David J

    2014-07-25T23:59:59.000Z

    .S. case of proliferation in the Manhattan Project. Network and operational parameters were found that drove expected Latencies high while others increased the Latency distribution variance. Further confidence was built with historical analyses...

  3. An Embedded System for Safe, Secure and Reliable Execution of High Consequence Software

    SciTech Connect (OSTI)

    MCCOY,JAMES A.

    2000-08-29T23:59:59.000Z

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an execution environment that is ultra reliable from a system viewpoint. In many cases the safety and security of the system depends upon the reliable cooperation between the hardware and the software to meet real-time system throughput requirements. The selection of a microprocessor and its associated development environment for an embedded application has the most far-reaching effects on the development and production of the system than any other element in the design. The effects of this choice ripple through the remainder of the hardware design and profoundly affect the entire software development process. While state-of-the-art software engineering principles indicate that an object oriented (OO) methodology provides a superior development environment, traditional programming languages available for microprocessors targeted for deeply embedded applications do not directly support OO techniques. Furthermore, the microprocessors themselves do not typically support nor do they enforce an OO environment. This paper describes a system level approach for the design of a microprocessor intended for use in deeply embedded high consequence applications that both supports and enforces an OO execution environment.

  4. Electric Power Infrastructure Reliability and Security (EPIRS) Reseach and Development Initiative

    SciTech Connect (OSTI)

    Rick Meeker; L. Baldwin; Steinar Dale; Alexander Domijan; Davild Larbalestier; Hui Li; Peter McLaren; Sastry Pamidi; Horatio Rodrigo; Michael Steurer

    2010-03-31T23:59:59.000Z

    Power systems have become increasingly complex and face unprecedented challenges posed by population growth, climate change, national security issues, foreign energy dependence and an aging power infrastructure. Increased demand combined with increased economic and environmental constraints is forcing state, regional and national power grids to expand supply without the large safety and stability margins in generation and transmission capacity that have been the rule in the past. Deregulation, distributed generation, natural and man-made catastrophes and other causes serve to further challenge and complicate management of the electric power grid. To meet the challenges of the 21st century while also maintaining system reliability, the electric power grid must effectively integrate new and advanced technologies both in the actual equipment for energy conversion, transfer and use, and in the command, control, and communication systems by which effective and efficient operation of the system is orchestrated - in essence, the 'smart grid'. This evolution calls for advances in development, integration, analysis, and deployment approaches that ultimately seek to take into account, every step of the way, the dynamic behavior of the system, capturing critical effects due to interdependencies and interaction. This approach is necessary to better mitigate the risk of blackouts and other disruptions and to improve the flexibility and capacity of the grid. Building on prior Navy and Department of Energy investments in infrastructure and resources for electric power systems research, testing, modeling, and simulation at the Florida State University (FSU) Center for Advanced Power Systems (CAPS), this project has continued an initiative aimed at assuring reliable and secure grid operation through a more complete understanding and characterization of some of the key technologies that will be important in a modern electric system, while also fulfilling an education and outreach mission to provide future energy workforce talent and support the electric system stakeholder community. Building upon and extending portions of that research effort, this project has been focused in the following areas: (1) Building high-fidelity integrated power and controls hardware-in-the-loop research and development testbed capabilities (Figure 1). (2) Distributed Energy Resources Integration - (a) Testing Requirements and Methods for Fault Current Limiters, (b) Contributions to the Development of IEEE 1547.7, (c) Analysis of a STATCOM Application for Wind Resource Integration, (d) Development of a Grid-Interactive Inverter with Energy Storage Elements, (e) Simulation-Assisted Advancement of Microgrid Understanding and Applications; (3) Availability of High-Fidelity Dynamic Simulation Tools for Grid Disturbance Investigations; (4) HTS Material Characterization - (a) AC Loss Studies on High Temperature Superconductors, (b) Local Identification of Current-Limiting Mechanisms in Coated Conductors; (5) Cryogenic Dielectric Research; and (6) Workshops, education, and outreach.

  5. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    J. [2004], Low-latency cryptographic protection for SCADAlatency high-integrity security retrofit for lecacy SCADA

  6. Optimal Resource Allocation for Security in Reliability Systems M. N. Azaiez

    E-Print Network [OSTI]

    Wang, Hai

    systems, about protecting nuclear power plants against terrorist attacks or sabotage, or about ensuring, the threat is usually assumed to be static, rather than responding in an adaptive way to the defenses to defense against intentional threats to security have dealt either with components in isolation (Major

  7. Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security Reliability Criteria

    E-Print Network [OSTI]

    Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security control system as well as reasonable strength of grid originally. Because investment for power system the stability, and dynamic characteristics of the new system. A main reason of the separated work process

  8. Human Reliability Program Overview

    SciTech Connect (OSTI)

    Bodin, Michael

    2012-09-25T23:59:59.000Z

    This presentation covers the high points of the Human Reliability Program, including certification/decertification, critical positions, due process, organizational structure, program components, personnel security, an overview of the US DOE reliability program, retirees and academia, and security program integration.

  9. Apparatus for fixing latency

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Moon, Justin (Bountiful, UT); Koehler, Roger O. (Provo, UT)

    2009-09-08T23:59:59.000Z

    An apparatus for fixing computational latency within a deterministic region on a network comprises a network interface modem, a high priority module and at least one deterministic peripheral device. The network interface modem is in communication with the network. The high priority module is in communication with the network interface modem. The at least one deterministic peripheral device is connected to the high priority module. The high priority module comprises a packet assembler/disassembler, and hardware for performing at least one operation. Also disclosed is an apparatus for executing at least one instruction on a downhole device within a deterministic region, the apparatus comprising a control device, a downhole network, and a downhole device. The control device is near the surface of a downhole tool string. The downhole network is integrated into the tool string. The downhole device is in communication with the downhole network.

  10. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  11. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01T23:59:59.000Z

    total of 15 metrics. Pathway reliability General objectives Adequacy Security Functional zones Primary energy supply

  12. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01T23:59:59.000Z

    total of 15 metrics. Pathway reliability General objectives Adequacy Security Functional zones Primary energy supply

  13. Electricity Reliability

    E-Print Network [OSTI]

    electric power equipment with more energy efficiency and higher capacity than today's systems of modernizing the electric grid to meet the nations's need for reliable, electric power, enhancing security continues to increase within the electricity infrastructure. DOE is conducting research, development

  14. architectures security standards: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    independent deployment of components, and intermediary components to reduce interaction latency, enforce security, and encapsulate legacy systems. In this paper, we introduce the...

  15. Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems.

    SciTech Connect (OSTI)

    Ruthruff, Joseph; Armstrong, Robert C.; Davis, Benjamin Garry; Mayo, Jackson; Punnoose, Ratish J.

    2012-09-01T23:59:59.000Z

    Formal methods describe a class of system analysis techniques that seek to prove specific propertiesabout analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest fromboth internal and external customersof Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquelypositioned to advance the state-of-the-art with respect toseveral research and application areaswithin formal methods. This research project was a one-yeareffort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research&Development program toinvestigate the opportunities for formal methods to impactSandia's present mission areas, morefully understand the needs of the research community in the area of formal methods and whereSandia can contribute, and clarify from those potential research paths those that would best advancethe mission-area interests of Sandia. The accomplishmentsfrom this project reinforce the utilityof formal methods in Sandia, particularly in areas relevantto Cyber Security, and set the stagefor continued Sandia investments to ensure this capabilityis utilized and advanced within thislaboratory to serve the national interest.4

  16. 2014 Human Reliability Program Workshop

    Broader source: Energy.gov [DOE]

    Announcing The Human Reliability Program Workshop Sponsored by Office of Security (AU-50), U.S Department of Energy In collaboration with NA, NE, EM and SC

  17. Java Parallel Secure Stream for Grid Computing

    SciTech Connect (OSTI)

    Chen, Jie; Akers, Walter; Chen, Ying; Watson, William

    2001-09-01T23:59:59.000Z

    The emergence of high speed wide area networks makes grid computing a reality. However grid applications that need reliable data transfer still have difficulties to achieve optimal TCP performance due to network tuning of TCP window size to improve the bandwidth and to reduce latency on a high speed wide area network. This paper presents a pure Java package called JPARSS (Java Par-allel Secure Stream) that divides data into partitions that are sent over several parallel Java streams simultaneously and allows Java or Web applications to achieve optimal TCP performance in a gird environment without the necessity of tuning the TCP window size. Several experimental results are provided to show that using parallel stream is more effective than tuning TCP window size. In addi-tion X.509 certificate based single sign-on mechanism and SSL based connection establishment are integrated into this package. Finally a few applications using this package will be discussed.

  18. PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY

    E-Print Network [OSTI]

    Smith, Sean W.

    . Introduction The United States built the power grid half a century ago, when network-based attacks were rare a partially unsecured slow legacy network. This network connects substations and control centers. In a control Processor (FEP), which exchanges messages with Data Ag- gregators (DA) in substations. A FEP and a DA

  19. Low Latency Stochastic Filtering Software Firewall Architecture

    E-Print Network [OSTI]

    Ghoshal, Pritha

    2012-08-29T23:59:59.000Z

    . . . . . . . . . . . . . . . . . . . . . 29 V METHODOLOGY . . . . . . . . . . . . . . . . . . . . . . . . . 31 VI RESULTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 v VI-A. Incremental Cleared Bloom Filter . . . . . . . . . . . 37 VI-A.1. Latency... . . . . . . . . . . . . . . . . . . . . . . 37 VI-A.2. Bandwidth . . . . . . . . . . . . . . . . . . . . 39 VI-A.3. Reduction in Dropped Packets . . . . . . . . . 40 VI-A.4. False Positive Rate . . . . . . . . . . . . . . . . 42 VI-B. Cold Cleared Bloom Filter...

  20. The Tradeoff between Spatial Jitter and Latency in Pointing Tasks

    E-Print Network [OSTI]

    Stürzlinger, Wolfgang

    The Tradeoff between Spatial Jitter and Latency in Pointing Tasks Andriy Pavlovych Wolfgang and investigate the effects of input device latency and spatial jitter on 2D pointing speed and accuracy. First, we characterize the latency and jitter of several common input devices. Then we present an experiment

  1. POWER GRID RELIABILITY AND SECURITY

    SciTech Connect (OSTI)

    Bose, Anjan; Venkatasubramanian, Vaithianathan; Hauser, Carl; Bakken, David; Anderson, David; Zhao, Chuanlin; Liu, Dong; Yang, Tao; Meng, Ming; Zhang, Lin; Ning, Jiawei; Tashman, Zaid

    2014-09-30T23:59:59.000Z

    This project has led to the development of a real-time simulation platform for electric power grids called Grid Simulator or GridSim for simulating the dynamic and information network interactions of large- scale power systems. The platform consists of physical models of power system components including synchronous generators, loads and control, which are simulated using a modified commercial power simulator namely Transient Stability Analysis Tool (TSAT) [1] together with data cleanup components, as well as an emulated substation level and wide-area power analysis components. The platform also includes realistic representations of communication network middleware that can emulate the real-time information flow back and forth between substations and control centers in wide-area power systems. The platform has been validated on a realistic 6000-bus model of the western American power system. The simulator GridSim developed in this project is the first of its kind in its ability to simulate real-time response of large-scale power grids, and serves as a cost effective real-time stability and control simulation platform for power industry.

  2. Human Reliability Program Workshop

    SciTech Connect (OSTI)

    Landers, John; Rogers, Erin; Gerke, Gretchen

    2014-05-18T23:59:59.000Z

    A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security and the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.

  3. Arbitration in crossbar interconnect for low latency

    DOE Patents [OSTI]

    Ohmacht, Martin; Sugavanam, Krishnan

    2013-02-05T23:59:59.000Z

    A system and method and computer program product for reducing the latency of signals communicated through a crossbar switch, the method including using at slave arbitration logic devices associated with Slave devices for which access is requested from one or more Master devices, two or more priority vector signals cycled among their use every clock cycle for selecting one of the requesting Master devices and updates the respective priority vector signal used every clock cycle. Similarly, each Master for which access is requested from one or more Slave devices, can have two or more priority vectors and can cycle among their use every clock cycle to further reduce latency and increase throughput performance via the crossbar.

  4. absolute latency plasma: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA)...

  5. avian short latency: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA)...

  6. Sandia National Laboratories: Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    States. I&C systems monitor the safe, reliable and secure generation and delivery of electricity and could have potential cyber vulnerabilities. At Sandia National Laboratories,...

  7. Method of data communications with reduced latency

    DOE Patents [OSTI]

    Blocksome, Michael A; Parker, Jeffrey J

    2013-11-05T23:59:59.000Z

    Data communications with reduced latency, including: writing, by a producer, a descriptor and message data into at least two descriptor slots of a descriptor buffer, the descriptor buffer comprising allocated computer memory segmented into descriptor slots, each descriptor slot having a fixed size, the descriptor buffer having a header pointer that identifies a next descriptor slot to be processed by a DMA controller, the descriptor buffer having a tail pointer that identifies a descriptor slot for entry of a next descriptor in the descriptor buffer; recording, by the producer, in the descriptor a value signifying that message data has been written into descriptor slots; and setting, by the producer, in dependence upon the recorded value, a tail pointer to point to a next open descriptor slot.

  8. Low latency and persistent data storage

    DOE Patents [OSTI]

    Fitch, Blake G; Franceschini, Michele M; Jagmohan, Ashish; Takken, Todd E

    2014-02-18T23:59:59.000Z

    Persistent data storage is provided by a method that includes receiving a low latency store command that includes write data. The write data is written to a first memory device that is implemented by a nonvolatile solid-state memory technology characterized by a first access speed. It is acknowledged that the write data has been successfully written to the first memory device. The write data is written to a second memory device that is implemented by a volatile memory technology. At least a portion of the data in the first memory device is written to a third memory device when a predetermined amount of data has been accumulated in the first memory device. The third memory device is implemented by a nonvolatile solid-state memory technology characterized by a second access speed that is slower than the first access speed.

  9. Low latency and persistent data storage

    DOE Patents [OSTI]

    Fitch, Blake G; Franceschini, Michele M; Jagmohan, Ashish; Takken, Todd

    2014-11-04T23:59:59.000Z

    Persistent data storage is provided by a computer program product that includes computer program code configured for receiving a low latency store command that includes write data. The write data is written to a first memory device that is implemented by a nonvolatile solid-state memory technology characterized by a first access speed. It is acknowledged that the write data has been successfully written to the first memory device. The write data is written to a second memory device that is implemented by a volatile memory technology. At least a portion of the data in the first memory device is written to a third memory device when a predetermined amount of data has been accumulated in the first memory device. The third memory device is implemented by a nonvolatile solid-state memory technology characterized by a second access speed that is slower than the first access speed.

  10. Storage Performance Virtualization via Throughput and Latency Control

    E-Print Network [OSTI]

    Riska, Alma

    Storage Performance Virtualization via Throughput and Latency Control JIANYONG ZHANG, ANAND storage systems. A consequence of this trend is the need to serve multiple users and/or workloads of the underlying storage system; (2) couple rate and latency allocation in a single scheduler, making them less

  11. Integer-valued Levy processes and low latency financial econometrics

    E-Print Network [OSTI]

    Wolfe, Patrick J.

    Integer-valued L´evy processes and low latency financial econometrics Ole E. Barndorff Abstract Motivated by features of low latency data in financial econometrics we study in detail integer- valued L´evy processes as the basis of price processes for high frequency econometrics. We propose using

  12. Variable Latency Turbo Codes for Wireless Multimedia Applications

    E-Print Network [OSTI]

    Valenti, Matthew C.

    Variable Latency Turbo Codes for Wireless Multimedia Applications Matthew C. Valenti and Brian D acceptable latency and Bit Error Rate BER or Frame Error Rate FER. In turbo coded systems a tradeo between an adaptive turbo coding strategy for wire- less multimedia communications that incor- porates a set

  13. Two Touch System Latency Estimators: High Accuracy and Low Overhead

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    for their screen size and definition, but their technical specifications never includes latency. In research, even known to degrade user's performance. Touch systems exhibit notable amount of latencies, but it is seldom Terms Human Factors, measurement, performance. INTRODUCTION Every interactive system exhibits some

  14. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  15. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2007-02-06T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  16. A Study of Networking Software Induced Latency Alexander Beifu1

    E-Print Network [OSTI]

    Carle, Georg

    A Study of Networking Software Induced Latency Alexander BeifuĂ?1 , Daniel Raumer2 , Paul Emmerich2, Emmerich et al. [16] described practical know-how on throughput measurement of Open vSwitch in which

  17. Low-latency network coding for streaming video multicast

    E-Print Network [OSTI]

    Tay, Kah Keng

    2008-01-01T23:59:59.000Z

    Network coding has been successfully employed to increase throughput for data transfers. However, coding inherently introduces packet inter-dependencies and adds decoding delays which increase latency. This makes it difficult ...

  18. Rhythmic training decreases latency-jitter of omission evoked potentials (OEPs) in humans

    E-Print Network [OSTI]

    Rhythmic training decreases latency-jitter of omission evoked potentials (OEPs) in humans Marijtje by means of wavelet denoising allowing determination of latency-jitter. Clear OEPs, consisting of a slow in OEPs amplitudes or latencies were observed. However, rhythmic experts showed less latency-jitter

  19. Target Following Performance in the Presence of Latency, Jitter, and Signal Dropouts

    E-Print Network [OSTI]

    Stürzlinger, Wolfgang

    Target Following Performance in the Presence of Latency, Jitter, and Signal Dropouts Andriy increase very quickly for latencies of over 110 ms, for latency jitters above 40 ms, and for dropout rates, latency jitter, dropouts, tracking, moving target. INDEX TERMS: H.5.2. [Information Interfaces

  20. Improving Network Reliability: Analysis, Methodology, and Algorithms

    E-Print Network [OSTI]

    Booker, Graham B.

    2010-07-14T23:59:59.000Z

    The reliability of networking and communication systems is vital for the nation's economy and security. Optical and cellular networks have become a critical infrastructure and are indispensable in emergency situations. This dissertation outlines...

  1. Energy Infrastructure Events and Expansions Infrastructure Security...

    Office of Environmental Management (EM)

    Year-in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S....

  2. Scalla: Structured Cluster Architecture for Low Latency Access

    SciTech Connect (OSTI)

    Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

    2012-03-20T23:59:59.000Z

    Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

  3. North American Electric Reliability Corporation (NERC): Reliability...

    Office of Environmental Management (EM)

    (NERC): Reliability Considerations from the Integration of Smart Grid North American Electric Reliability Corporation (NERC): Reliability Considerations from the Integration of...

  4. Reliable low latency I/O in torus-based interconnection networks

    E-Print Network [OSTI]

    Azeez, Babatunde

    2007-04-25T23:59:59.000Z

    In today's high performance computing environment I/O remains the main bottleneck in achieving the optimal performance expected of the ever improving processor and memory technologies. Interconnection networks therefore combines processing units...

  5. Reliable low latency I/O in torus-based interconnection networks 

    E-Print Network [OSTI]

    Azeez, Babatunde

    2007-04-25T23:59:59.000Z

    In today's high performance computing environment I/O remains the main bottleneck in achieving the optimal performance expected of the ever improving processor and memory technologies. Interconnection networks therefore combines processing units...

  6. Low Computation and Low Latency Algorithms for Distributed Sensor Network

    E-Print Network [OSTI]

    Cevher, Volkan

    Low Computation and Low Latency Algorithms for Distributed Sensor Network Initialization M. Borkar distribution can be determined in a distributed heterogeneous sensor network with reduced subspace distribution for networks with a variety of sensor types as long as the collective set of measurements from all

  7. A Latency-Determining/User Directed Firefox Browser Extension

    E-Print Network [OSTI]

    Mein, Philip

    2012-12-31T23:59:59.000Z

    objects, and transmission delays and errors can impact the utility of the web browser application. To improve the overall user experience the application needs to not only provide feedback to the end user about the latency of links that are available...

  8. Factors important for the establishment and maintenance of HIV-1 latency in CD4 T cells

    E-Print Network [OSTI]

    Soto, Paula Campos

    2008-01-01T23:59:59.000Z

    the Establishment and Maintenance of HIV-1 Latency in CD4 TFunction, generation, and maintenance. Annu Rev Immunol. 19.the Establishment and Maintenance of HIV-1 Latency in CD4 T

  9. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  10. ATM Forum Document Number: ATM_Forum/96-1762 Title: MIMO Latency: Revised Proposed Text

    E-Print Network [OSTI]

    Jain, Raj

    and the last-bit exit - FILO latency = Time between the first-bit entry and the last-bit exit - NFOT = Nominal-bit entry and the first-bit exit 2. LILO latency: Time between the last-bit entry and the last-bit exit 3. FILO latency: Time between the first-bit entry and the last-bit exit 4. LIFO latency: Time between

  11. Results of Comparing Bandwidth Usage and Latency: Service Location Protocol and Jini

    E-Print Network [OSTI]

    Barbeau, Michel

    Results of Comparing Bandwidth Usage and Latency: Service Location Protocol and Jini Javier Govea. This paper focuses on analyzing and evaluating two of these limitations, bandwidth usage and latency, of two present the results of our bandwidth usage analysis and the results a comparison of latency of SLP

  12. Accounting for Memory Use, Cost, Throughput, and Latency in the Design of a Media Server

    E-Print Network [OSTI]

    Chang, Edward Y.

    : the per­stream costs and the worst­case initial latency before a new media request can be satisfied. WeAccounting for Memory Use, Cost, Throughput, and Latency in the Design of a Media Server Edward scheduling and data place­ ment ones. We show that, some disk latency reduction techniques can

  13. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  14. Low latency remote memory access on the Intel Paragon

    SciTech Connect (OSTI)

    Rosing, M. [Pacific Northwest Lab., Richland, WA (United States); Pierce, P. [Idaho National Engineering Lab., Idaho Falls, ID (United States)

    1994-06-20T23:59:59.000Z

    We describe a cooperative project between Pacific Northwest Laboratory and Intel on providing low latency communications on the Intel Paragon. Our interest is in developing modules that are tailored to specific types of communication and are optimized for these cases. The modules described are implemented as simple extensions to the Paragon operating system. The first extension supports remote reads, writes, and accumulates on subsections of matrices. This module is intended to be used where the communication pattern is not known until run time. The second extension is designed to support low latency communication for short messages in a pipelined fashion. Finally, an interface for doing highly structured communication where the patterns of communication are well understood ahead of time is described. This is intended to be used in global communications such as global reduction.

  15. Short-term and long-term reliability studies in the deregulated power systems

    E-Print Network [OSTI]

    Li, Yishan

    2006-04-12T23:59:59.000Z

    for the new structure to maintain system reliability. Power system reliability is comprised of two basic components, adequacy and security. In terms of the time frame, power system reliability can mean short-term reliability or long-term reliability. Short...

  16. Combination of Safety and Security Analysis -Finding Security Problems That Threaten The

    E-Print Network [OSTI]

    Boyer, Edmond

    -physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security, France (2013Combination of Safety and Security Analysis - Finding Security Problems That Threaten The Safety of a System Max Steiner and Peter Liggesmeyer AG Software Engineering: Dependability, TU Kaiserslautern

  17. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  18. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  19. Lessons Learned from Cyber Security Assessments of SCADA and...

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER...

  20. apparatus-localized latency determinant: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA)...

  1. a-bomb survivors latency: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA)...

  2. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01T23:59:59.000Z

    Physical security Information security Interdepend- enciesagainst threats. Information security: The degree to whichPhysical security Information security Interdependencies

  3. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01T23:59:59.000Z

    Physical security Information security Interdepend- enciesagainst threats. Information security: The degree to whichPhysical security Information security Interdependencies

  4. Grid Reliability- An Electric Utility Company's Perspective

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—covers Southern Company's business continuity, North American Electric Reliability Corporation (NERC) cybersecurity, and homeland security as well as physical recovery after a major outage, and five questions to ask your local utility.

  5. COMPASS Latency Optimal Routing in Heterogeneous Chord-based P2P Systems

    E-Print Network [OSTI]

    Vetter, Thomas

    COMPASS ­ Latency Optimal Routing in Heterogeneous Chord-based P2P Systems Lukas Probst Nenad. In this report, we present COMPASS, a protocol for efficient data access in het- erogeneous mobile Chord-based P2P systems. COMPASS takes into ac- count that the network latencies of nodes in a mobile P2P network

  6. Power-Efficient State Exchange Scheme for Low-Latency SMU Design of Viterbi Decoder

    E-Print Network [OSTI]

    Hung, Shih-Hao

    Power-Efficient State Exchange Scheme for Low-Latency SMU Design of Viterbi Decoder Chun-Yuan Chu and decoding latency. In this paper, we propose a new Survivor Memory Unit (SMU) algorithm, named State). Based on this enhancement, we propose two types of SE-SMU. Proposed type-I SE-SMU has lower register

  7. Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems

    E-Print Network [OSTI]

    Xie, Tao

    Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems 1. Introduction Parallel applications with energy and low-latency constraints are emerging monitoring. However, conventional energy-driven task allocation schemes for a cluster of embedded nodes only

  8. A Low Latency MAC scheme for Event-Driven Wireless Sensor Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Low Latency MAC scheme for Event-Driven Wireless Sensor Networks Hung-Cuong LE 1 , Hervé GUYENNET which we call LLMAC (Low Latency MAC) for event-driven wireless sensor networks (WSN). In this kind Introduction Wireless sensor network is a very hot research topic tendency in distributed systems. A WSN

  9. Effects of Tracking Technology, Latency, and Spatial Jitter on Object Movement

    E-Print Network [OSTI]

    MacKenzie, Scott

    Effects of Tracking Technology, Latency, and Spatial Jitter on Object Movement Robert J. Teather and spatial jitter on 2D pointing tasks and 3D object movement tasks. First, we characterize jitter artificially introduce latency and jitter to the mouse and compared the results to the 3D tracker. Results

  10. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  11. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect (OSTI)

    Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

    1996-06-20T23:59:59.000Z

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  12. Reliability-Centered Maintenance

    Broader source: Energy.gov [DOE]

    Reliability-centered maintenance leverages the same practices and technologies of predictive maintenance.

  13. SPIDERS JCTD Smart Cyber-Secure Microgrids

    Broader source: Energy.gov [DOE]

    The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) Joint Capability Technology Demonstration (JCTD) is a groundbreaking program to bolster the cyber security and energy efficiency of U.S. military installations and transfer the knowhow to non-military critical infrastructure.

  14. Distributed Web Server Architecture: A Framework for Global, Fast, Reliable Content Delivery Current methods of delivering content quickly and reliably over the web can be hard and expensive to implement.

    E-Print Network [OSTI]

    Distributed Web Server Architecture: A Framework for Global, Fast, Reliable Content Delivery Brad that provides low­latency initial response to customer requests followed by checking for a better server and redirecting the customer to that better server if one is available. The solution utilizes aspects of Internet

  15. Communication Reliability in Network on Chip Designs

    E-Print Network [OSTI]

    Kumar, Reeshav

    2012-10-19T23:59:59.000Z

    The performance of low latency Network on Chip (NoC) architectures, which incorporate fast bypass paths to reduce communication latency, is limited by crosstalk induced skewing of signal transitions on link wires. As a result of crosstalk...

  16. Castor: Secure Code Updates using Symmetric Cryptosystems Donnie H. Kim Rajeev Gandhi Priya Narasimhan

    E-Print Network [OSTI]

    Sadeh, Norman M.

    . We describe an implementation of Castor that hard- ens the TinyOS-based update protocol, Deluge with those of Deluge and with those of a contemporary secure update protocol, Sluice, that uses asymmetric as compared to Deluge, and lower resource usage as well as lower end-to-end update latency as compared

  17. Power electronics reliability analysis.

    SciTech Connect (OSTI)

    Smith, Mark A.; Atcitty, Stanley

    2009-12-01T23:59:59.000Z

    This report provides the DOE and industry with a general process for analyzing power electronics reliability. The analysis can help with understanding the main causes of failures, downtime, and cost and how to reduce them. One approach is to collect field maintenance data and use it directly to calculate reliability metrics related to each cause. Another approach is to model the functional structure of the equipment using a fault tree to derive system reliability from component reliability. Analysis of a fictitious device demonstrates the latter process. Optimization can use the resulting baseline model to decide how to improve reliability and/or lower costs. It is recommended that both electric utilities and equipment manufacturers make provisions to collect and share data in order to lay the groundwork for improving reliability into the future. Reliability analysis helps guide reliability improvements in hardware and software technology including condition monitoring and prognostics and health management.

  18. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  19. applicable protocol fails: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    robust, reliable and efficient communication protocols so as to minimize the end-to-end latency and packet drops. Design of a secure and efficient communication protocol for...

  20. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  1. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  2. Towards a Scalable and Reliable Real Time In-Network Data Analysis Infrastructure

    SciTech Connect (OSTI)

    Ciraci, Selim; Yin, Jian

    2011-12-01T23:59:59.000Z

    The smart grid applications requires real time analysis, response within the order of milliseconds and high-reliability because of the mission critical structure of the power grid system. The only way to satisfy these requirements is in network data analysis and build-in redundancy routing for failures. To achieve this, we propose a data dissemination system that builds routes using network flow algorithms, have in network processing of the data and utilize data encoding to cope with high latencies.

  3. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  4. Securing against fraud in mobile communications : system design and development in 3G mobile networks

    E-Print Network [OSTI]

    Mochizuki, Yujiro, 1973-

    2006-01-01T23:59:59.000Z

    Network security ensures the consistency, integrity, and reliability of telecommunications systems. Authorized network access prevents fraudulent communications and maintains the availability of the systems. However, limited ...

  5. Northwest Regional Technology Center, April 2013 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Office of Electricity Delivery & Energy Reliability · Samara Moore, National Security Staff; Director, Snohomish County PUD · Mike Hamilton, CISO, City of Seattle · Philip Jones, WUTC and President, NARUC · Lt

  6. Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials

    E-Print Network [OSTI]

    Stell, A.J.

    Stell,A.J. Sinnott,R.O. Ajayi,O. 2nd International Conference on Availability, Reliability and Security, (ARESâ??07), Vienna, Austria, April, 2007.

  7. Software Security Rules, SDLC Perspective

    E-Print Network [OSTI]

    Banerjee, C

    2009-01-01T23:59:59.000Z

    Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are el...

  8. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  9. Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus

    E-Print Network [OSTI]

    dynamic stability, power system reliability, power system scheduling, power system security, power transmission control, power transmission reliability I . INTRODUCTION Power system stability problems cause many stability problems. Between the power system generation pattern and the load pattern

  10. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nuclear power plant in 1975 illustrated the need for increased research into safety system reliability during abnormal events such as fire. Months prior to the incident, the US...

  11. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  12. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  13. Medical Aspects of Reliability

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation covers the medical evaluation as part of a human reliability program, particularly the various medical qualifications and potential disqualifiers.

  14. Lifetime and Reliability

    Broader source: Energy.gov [DOE]

    A DOE Solid-State Lighting Program technology fact sheet on lifetime, reliability, and failure as related to LED-based products.

  15. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  16. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  20. Hawaii electric system reliability.

    SciTech Connect (OSTI)

    Silva Monroy, Cesar Augusto; Loose, Verne William

    2012-09-01T23:59:59.000Z

    This report addresses Hawaii electric system reliability issues; greater emphasis is placed on short-term reliability but resource adequacy is reviewed in reference to electric consumers' views of reliability %E2%80%9Cworth%E2%80%9D and the reserve capacity required to deliver that value. The report begins with a description of the Hawaii electric system to the extent permitted by publicly available data. Electrical engineering literature in the area of electric reliability is researched and briefly reviewed. North American Electric Reliability Corporation standards and measures for generation and transmission are reviewed and identified as to their appropriateness for various portions of the electric grid and for application in Hawaii. Analysis of frequency data supplied by the State of Hawaii Public Utilities Commission is presented together with comparison and contrast of performance of each of the systems for two years, 2010 and 2011. Literature tracing the development of reliability economics is reviewed and referenced. A method is explained for integrating system cost with outage cost to determine the optimal resource adequacy given customers' views of the value contributed by reliable electric supply. The report concludes with findings and recommendations for reliability in the State of Hawaii.

  1. Medical Device Reliability BIOMATERIALS

    E-Print Network [OSTI]

    NEMI Medical Electronics team to address short- and long-term reliability issues with medical devices. OurMedical Device Reliability BIOMATERIALS Our goal is to provide medical device manufacturers, and consistency of active implantable medical devices. These devices, including pacemakers, cardiac defibrillators

  2. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  3. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  4. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  5. SUBMITTED TO IEEE TRANSACTIONS ON POWER SYSTEMS, FEBRUARY 2002 1 Quantifying Transmission Reliability Margin

    E-Print Network [OSTI]

    SUBMITTED TO IEEE TRANSACTIONS ON POWER SYSTEMS, FEBRUARY 2002 1 Quantifying Transmission, power transmission reliability, power system security, power system availability I. Introduction Bulk power transfer capability computations have many uses in electric power system operation and planning

  6. Photovoltaic system reliability

    SciTech Connect (OSTI)

    Maish, A.B.; Atcitty, C. [Sandia National Labs., NM (United States); Greenberg, D. [Ascension Technology, Inc., Lincoln Center, MA (United States)] [and others

    1997-10-01T23:59:59.000Z

    This paper discusses the reliability of several photovoltaic projects including SMUD`s PV Pioneer project, various projects monitored by Ascension Technology, and the Colorado Parks project. System times-to-failure range from 1 to 16 years, and maintenance costs range from 1 to 16 cents per kilowatt-hour. Factors contributing to the reliability of these systems are discussed, and practices are recommended that can be applied to future projects. This paper also discusses the methodology used to collect and analyze PV system reliability data.

  7. Reliable solar: powering communities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements Recently ApprovedReliability Technology earns award ReliabilityReliable

  8. A systems-theoretic security model for large scale, complex systems applied to the US air transportation system

    E-Print Network [OSTI]

    Laracy, Joseph R. (Joseph Raymond)

    2007-01-01T23:59:59.000Z

    Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from ...

  9. Reducing WWW Latency and Bandwidth Requirements by RealTime Distillation

    E-Print Network [OSTI]

    California at Berkeley, University of

    Reducing WWW Latency and Bandwidth Requirements by Real­Time Distillation Armando Fox and Eric A Distillation and Refinement Can Help 1. The Concept of Datatype­Specific Distillation 2. Refinement 3. Trading. Optimizing for Rendering on Impoverished Devices 3. An Implemented HTTP Proxy Based on Real­Time Distillation

  10. Understanding optimal data gathering in the energy and latency domains of a wireless sensor network

    E-Print Network [OSTI]

    Melodia, Tommaso

    of city districts. In typical applications, sensors monitor their neighboring area, extract informationUnderstanding optimal data gathering in the energy and latency domains of a wireless sensor network Telekommunikation Wien (ftw.), Donau City Strae 1, 1220 Wien, Austria Received 14 October 2005; received in revised

  11. "Cut Me Some Slack": Latency-Aware Live Migration for Databases

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    by leveraging `migration slack', or resources that can be used for migration without excessively impacting query"Cut Me Some Slack": Latency-Aware Live Migration for Databases Sean Barker Yun Chi Hyun Jin Moon and exploit migration slack in real time. Using our prototype, we demonstrate that Slacker effectively

  12. Effect of Delivery Latency, Feedback Frequency and Network Load on Adaptive Multimedia Streaming

    E-Print Network [OSTI]

    Effect of Delivery Latency, Feedback Frequency and Network Load on Adaptive Multimedia Streaming) balances the need for high quality with increased network utilization when streaming multimedia. QOAS-oriented adaptive multimedia streaming. It also shows how high end-user perceived quality is maintained

  13. On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack

    E-Print Network [OSTI]

    On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack Jing Jin.e. anonymity) of all anonymous networks in the presence of timing attack. Our metric is based on a novel conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer

  14. The path inference filter: model-based low-latency map matching of probe

    E-Print Network [OSTI]

    Abbeel, Pieter

    of automation onboard vehicles have created a very fertile ground for GPS data sources from probe vehicles for example [4], and the paradigm of connected (and automated) vehicles does not automatically translateThe path inference filter: model-based low-latency map matching of probe vehicle data Timothy

  15. An AWGR based Low-Latency Optical Switch for Data Centers and High Performance Computing Systems

    E-Print Network [OSTI]

    Kolner, Brian H.

    i An AWGR based Low-Latency Optical Switch for Data Centers and High Performance Computing Systems based optical switch for data centers and high performance computing systems that builds upon several for Data Centers and High Performance Computing Systems ..i ABSTRACT .....................................

  16. Improving IEEE 802.15.4 for Low-latency Energy-efficient Industrial Applications

    E-Print Network [OSTI]

    Breu, Ruth

    &D" of Siemens AG is currently evaluating wireless technology in the field of industrial automation.1 An Industrial Case Study The typical application scenario for automation environments to be studiedImproving IEEE 802.15.4 for Low-latency Energy-efficient Industrial Applications Feng Chen Computer

  17. Reliability and Safety

    Broader source: Energy.gov [DOE]

    DOE solar reliability and safety research and development (R&D) focuses on testing photovoltaic (PV) modules, inverters, and systems for long-term performance, and helping investors, consumers,...

  18. Reliability Standards Owner

    Broader source: Energy.gov [DOE]

    This position is located in the Internal Operations and Asset Management group of Planning and Asset Management (TP). A successful candidate in this position will serve as the Reliability Standards...

  19. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  1. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  2. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  3. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  4. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  5. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  6. Gearbox Reliability Collaborative Update (Presentation)

    SciTech Connect (OSTI)

    Sheng, S.

    2013-10-01T23:59:59.000Z

    This presentation was given at the Sandia Reliability Workshop in August 2013 and provides information on current statistics, a status update, next steps, and other reliability research and development activities related to the Gearbox Reliability Collaborative.

  7. Sandia Energy - PV Systems Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Systems Reliability Home Stationary Power Energy Conversion Efficiency Solar Energy Photovoltaics PV Systems Reliability PV Systems ReliabilityCoryne Tasca2015-05-08T03:40:54+00:00...

  8. Quantifying transmission reliability margin J. Zhang, I. Dobson*, F.L. Alvarado

    E-Print Network [OSTI]

    Dobson, Ian

    , it is likely that the power system will remain secure despite the uncertainty. The transmission reliability uses in electric power system operation and planning. In the operation of bilateral markets, available capability can be used to assess power system security when local power sources are replaced by imported

  9. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  11. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  12. Photovoltaic module reliability workshop

    SciTech Connect (OSTI)

    Mrig, L. (ed.)

    1990-01-01T23:59:59.000Z

    The paper and presentations compiled in this volume form the Proceedings of the fourth in a series of Workshops sponsored by Solar Energy Research Institute (SERI/DOE) under the general theme of photovoltaic module reliability during the period 1986--1990. The reliability Photo Voltaic (PV) modules/systems is exceedingly important along with the initial cost and efficiency of modules if the PV technology has to make a major impact in the power generation market, and for it to compete with the conventional electricity producing technologies. The reliability of photovoltaic modules has progressed significantly in the last few years as evidenced by warranties available on commercial modules of as long as 12 years. However, there is still need for substantial research and testing required to improve module field reliability to levels of 30 years or more. Several small groups of researchers are involved in this research, development, and monitoring activity around the world. In the US, PV manufacturers, DOE laboratories, electric utilities and others are engaged in the photovoltaic reliability research and testing. This group of researchers and others interested in this field were brought together under SERI/DOE sponsorship to exchange the technical knowledge and field experience as related to current information in this important field. The papers presented here reflect this effort.

  13. Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff

    E-Print Network [OSTI]

    Gursoy, Mustafa Cenk

    Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff required for secure and reliable communications, and the wideband slope. Increased bit energy requirements to security issues, another pivotal concern in most wireless systems is energy-efficient operation especially

  14. SEIF: Secure and Efficient Intrusion-Fault tolerant routing protocol for wireless sensor networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 SEIF: Secure and Efficient Intrusion-Fault tolerant routing protocol for wireless sensor networks Informatique Algiers, Algeria Email: lnoureddine4@gmail.com Abstract--In wireless sensor networks, reliability network, Security, Intrusion tolerance, Fault tolerance, Secure routing. I. INTRODUCTION Wireless Sensor

  15. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  16. Security Games for Vehicular Networks Tansu Alpcan, Member, IEEE, and Sonja Buchegger, Member, IEEE

    E-Print Network [OSTI]

    Chen, Ing-Ray

    . The effectiveness of the security game solutions is evaluated numerically using realistic simulation data obtainedSecurity Games for Vehicular Networks Tansu Alpcan, Member, IEEE, and Sonja Buchegger, Member, IEEE Abstract--Vehicular networks (VANETs) can be used to improve transportation security, reliability

  17. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  18. ISSAT 2012 KCoverage Reliability Evaluation K-COVERAGE RELIABILITY EVALUATION

    E-Print Network [OSTI]

    Xing, Liudong

    #12;7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 2 Introduction Wireless sensor;7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 7 Model 13 Consider a set of sensor nodes (SN7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 1 K-COVERAGE RELIABILITY EVALUATION

  19. Adaptive Infrastructures Toward a Secure and

    E-Print Network [OSTI]

    Amin, S. Massoud

    concept important to the Electric Power Grid and Energy Infrastructure? ­ A secure "architected" sensing of computer, communication, sensing and control technology which operates in parallel with an electric power grid for the purpose of enhancing the reliability of electric power delivery, minimizing the cost

  20. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  1. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  2. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  3. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  4. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  5. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  6. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  7. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  8. Microgrids and Heterogeneous Security, Quality, Reliability, andAvailability

    SciTech Connect (OSTI)

    Marnay, Chris

    2007-01-31T23:59:59.000Z

    This paper describes two stylized alternative visions inpopular currencyof how the power system might evolve to meet futurerequirements for the high quality electricity service that modern digitaleconomies demand, a supergrids paradigm and a dispersed paradigm. Some ofthe economics of the dispersed vision are explored. Economic perspectivesare presented on both the choice of homogeneous universal power qualityupstream in the electricity supply, and also on the extremelyheterogeneous require-ments of end-use loads. Finally, the potential roleof microgrids in delivering heterogeneous power quality is demonstratedby reference to two ongoing microgrid tests in the U.S. andJapan.

  9. Office of Electricity Delivery and Energy Reliability Cyber Security...

    Energy Savers [EERE]

    the Nation's Energy Infrastructure from Cyber Attacks Working to Achieve Cybersecurity in the Energy Sector Roadmap to Achieve Energy Delivery Systems Cybersecurity - 2011...

  10. Secure, Reliable and Dynamic Access to Distributed Clinical Data

    E-Print Network [OSTI]

    Glasgow, University of

    or settles, as to compose differing opinions, or reconciles, as reconciles contending factions. 15. COMPUTES

  11. Office of Electricity Delivery and Energy Reliability Cyber Security

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagementOPAM PolicyOf Environmental Management MajorElectricity

  12. Reliability, Safety, and Security in Everyday Embedded Systems

    E-Print Network [OSTI]

    Koopman, Philip

    lives. From automobiles to elevators, kitchen appliances to televisions, and water heaters to cell. A domestic hot water heater that overheats water, causing scalding burns on a child. A thermostat that doesn't turn on heat when needed, causing household water pipes to freeze and burst. A microwave oven

  13. Reliability of Electrical Interconnects (Presentation)

    SciTech Connect (OSTI)

    Devoto, D.

    2014-06-01T23:59:59.000Z

    This presentation discusses the status of NREL's research on the reliability of electrical interconnects.

  14. Empirical Bayes Estimation of Reliability

    E-Print Network [OSTI]

    Pensky, Marianna

    types of equipment relies on statistical inference about char- acteristics of reliabilityEmpirical Bayes Estimation of Reliability Introduction Assessment of the reliability of various such as reliability function, mean lifetime of the devices, or failure rate. Gen- eral techniques of statistical

  15. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  16. Target Tracking with Packet Delays and Losses QoI amid Latencies and Missing Data

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    in the field, e.g., along the perimeter of a secured area, to monitor passing targets such as vehicles

  17. Advances in high-throughput speed, low-latency communication for embedded instrumentation ( 7th Annual SFAF Meeting, 2012)

    ScienceCinema (OSTI)

    Jordan, Scott [Physik Instrumente

    2013-02-11T23:59:59.000Z

    Scott Jordan on "Advances in high-throughput speed, low-latency communication for embedded instrumentation" at the 2012 Sequencing, Finishing, Analysis in the Future Meeting held June 5-7, 2012 in Santa Fe, New Mexico.

  18. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01T23:59:59.000Z

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  19. Power electronics reliability.

    SciTech Connect (OSTI)

    Kaplar, Robert James; Brock, Reinhard C.; Marinella, Matthew; King, Michael Patrick; Stanley, James K.; Smith, Mark A.; Atcitty, Stanley

    2010-10-01T23:59:59.000Z

    The project's goals are: (1) use experiments and modeling to investigate and characterize stress-related failure modes of post-silicon power electronic (PE) devices such as silicon carbide (SiC) and gallium nitride (GaN) switches; and (2) seek opportunities for condition monitoring (CM) and prognostics and health management (PHM) to further enhance the reliability of power electronics devices and equipment. CM - detect anomalies and diagnose problems that require maintenance. PHM - track damage growth, predict time to failure, and manage subsequent maintenance and operations in such a way to optimize overall system utility against cost. The benefits of CM/PHM are: (1) operate power conversion systems in ways that will preclude predicted failures; (2) reduce unscheduled downtime and thereby reduce costs; and (3) pioneering reliability in SiC and GaN.

  20. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  1. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  2. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  3. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01T23:59:59.000Z

    H. , 2004. Energy infrastructure and security. Annual Reviewdisruption, and energy security – valued by a total of 15History Consequences Energy security Economic Import levels

  4. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01T23:59:59.000Z

    H. , 2004. Energy infrastructure and security. Annual Reviewdisruption, and energy security – valued by a total of 15History Consequences Energy security Economic Import levels

  5. Reliable computation Peter Gacs

    E-Print Network [OSTI]

    Gacs, Peter

    of compressors 28 4.6. Exercises 30 5. The reliable storage problem 32 5.1. Clocked circuits 32 5.2. Storage 34 5.1. Cables 21 4.2. Compressors 23 4.3. Propagating safety 25 4.4. Endgame 26 4.5. The construction.3. Error-correcting codes 35 5.4. Refreshers 39 5.5. Exercises 48 6. Problems 49 7. Historical remarks 51

  6. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  7. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  8. My RESEARCH INTERESTS concentrate on: Design and implementation of novel cyber-physical systems with an enhanced functionality, security and

    E-Print Network [OSTI]

    Reznik, Leon

    . Melton and L. Reznik GPU-Based Simulation of Spiking Neural Networks with Real-Time Performance and High with an enhanced functionality, security and reliability and built upon sensor and control network platforms and reliability to security and safety Example : Integral quality evaluation procedures in cyber-physical systems

  9. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  10. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  11. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  12. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  13. Testing for PV Reliability (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.; Bansal, S.

    2014-09-01T23:59:59.000Z

    The DOE SUNSHOT workshop is seeking input from the community about PV reliability and how the DOE might address gaps in understanding. This presentation describes the types of testing that are needed for PV reliability and introduces a discussion to identify gaps in our understanding of PV reliability testing.

  14. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  15. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  16. Managing power system security and optimization

    SciTech Connect (OSTI)

    O'Grady, M.J. (Potomac Electric Power Co., Washington, DC (United States)); Briggs, W.T.; Stadlin, W.O.

    1994-10-01T23:59:59.000Z

    Power system control objectives of energy management systems (EMSs) are well defined and understood: reliability, security, and optimization. However, the approaches to achieving these objectives have often resulted in disjointed solutions and poor acceptance by system operators. This article describes how the new PEPCO EMS provides unique system-wide (generation, transmission, distribution) security and optimization strategies via a coordinated suite of real-time closed-loop control functions. System operators played a key role in defining the application features and user interfaces, ensuring correct operating practices.

  17. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  18. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  19. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  20. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  1. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  2. Abstract--This paper reports a method to evaluate composite power system reliability indices incorporating the voltage

    E-Print Network [OSTI]

    3 Abstract--This paper reports a method to evaluate composite power system reliability indices power flow (OPF) computation algorithm, considering the steady state voltage stability margin constraint In the deregulated power systems, reliability evaluation encompassing the system security features has come

  3. Real Time Grid Reliability Management 2005

    SciTech Connect (OSTI)

    Eto, Joe; Eto, Joe; Lesieutre, Bernard; Lewis, Nancy Jo; Parashar, Manu

    2008-07-07T23:59:59.000Z

    The increased need to manage California?s electricity grid in real time is a result of the ongoing transition from a system operated by vertically-integrated utilities serving native loads to one operated by an independent system operator supporting competitive energy markets. During this transition period, the traditional approach to reliability management -- construction of new transmission lines -- has not been pursued due to unresolved issues related to the financing and recovery of transmission project costs. In the absence of investments in new transmission infrastructure, the best strategy for managing reliability is to equip system operators with better real-time information about actual operating margins so that they can better understand and manage the risk of operating closer to the edge. A companion strategy is to address known deficiencies in offline modeling tools that are needed to ground the use of improved real-time tools. This project: (1) developed and conducted first-ever demonstrations of two prototype real-time software tools for voltage security assessment and phasor monitoring; and (2) prepared a scoping study on improving load and generator response models. Additional funding through two separate subsequent work authorizations has already been provided to build upon the work initiated in this project.

  4. Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom Potok, Andy Loebl

    E-Print Network [OSTI]

    Krings, Axel W.

    Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom technologically complex society makes knowing the vulnerability of such systems essential to improving their intrinsic reliability/survivability. Our discussion employs the power transmission grid. 1 Introduction

  5. Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project

    E-Print Network [OSTI]

    Sinnott, R.O.

    Sinnott,R.O. Stell,A.J. Bayer,M.M. Koetsier,J. The First International Conference on Availability, Reliability and Security (ARES-2006), Vienna, Austria, April, 2006.

  6. Evaluation of power system security and development of transmission pricing method

    E-Print Network [OSTI]

    Kim, Hyungchul

    2004-11-15T23:59:59.000Z

    classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability...

  7. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  8. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  9. Sandia National Laboratories: Inverter Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in Hosted by Sandia National Laboratories and the Electric Power Research Institute (EPRI) Inverter reliability drives project life cycle costs and plant performance. This...

  10. Sandia National Laboratories: Component Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in Hosted by Sandia National Laboratories and the Electric Power Research Institute (EPRI) Inverter reliability drives project life cycle costs and plant performance. This...

  11. Sandia National Laboratories: PV Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reliability Sandia Research on PV Arc-Fault Detection Submitted for US Patent On March 4, 2015, in Computational Modeling & Simulation, Energy, Facilities, News, News & Events,...

  12. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  13. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  14. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  15. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Duggan, David P. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Chavez, Adrian R. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM

    2006-11-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  16. RELIABILITY OF CAPACITOR CHARGING UNITS

    E-Print Network [OSTI]

    Sprott, Julien Clinton

    experience little change while those using the electronic cutoff would drift due to ageing components and changing parameters. The first few shots using the electronic cutoff were less reliable than subsequentRELIABILITY OF CAPACITOR CHARGING UNITS Clint Sprott July 30, 1965 University of Wisconsin

  17. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  18. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  19. OTRA-THS MAC to reduce Power Outage Data Collection Latency in a smart meter network

    SciTech Connect (OSTI)

    Garlapati, Shravan K [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL; Buehrer, Richard M [ORNL] [ORNL; Reed, Jeffrey H [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    The deployment of advanced metering infrastructure by the electric utilities poses unique communication challenges, particularly as the number of meters per aggregator increases. During a power outage, a smart meter tries to report it instantaneously to the electric utility. In a densely populated residential/industrial locality, it is possible that a large number of smart meters simultaneously try to get access to the communication network to report the power outage. If the number of smart meters is very high of the order of tens of thousands (metropolitan areas), the power outage data flooding can lead to Random Access CHannel (RACH) congestion. Several utilities are considering the use of cellular network for smart meter communications. In 3G/4G cellular networks, RACH congestion not only leads to collisions, retransmissions and increased RACH delays, but also has the potential to disrupt the dedicated traffic flow by increasing the interference levels (3G CDMA). In order to overcome this problem, in this paper we propose a Time Hierarchical Scheme (THS) that reduces the intensity of power outage data flooding and power outage reporting delay by 6/7th, and 17/18th when compared to their respective values without THS. Also, we propose an Optimum Transmission Rate Adaptive (OTRA) MAC to optimize the latency in power outage data collection. The analysis and simulation results presented in this paper show that both the OTRA and THS features of the proposed MAC results in a Power Outage Data Collection Latency (PODCL) that is 1/10th of the 4G LTE PODCL.

  20. Photovoltaic performance and reliability workshop

    SciTech Connect (OSTI)

    Mrig, L. [ed.

    1993-12-01T23:59:59.000Z

    This workshop was the sixth in a series of workshops sponsored by NREL/DOE under the general subject of photovoltaic testing and reliability during the period 1986--1993. PV performance and PV reliability are at least as important as PV cost, if not more. In the US, PV manufacturers, DOE laboratories, electric utilities, and others are engaged in the photovoltaic reliability research and testing. This group of researchers and others interested in the field were brought together to exchange the technical knowledge and field experience as related to current information in this evolving field of PV reliability. The papers presented here reflect this effort since the last workshop held in September, 1992. The topics covered include: cell and module characterization, module and system testing, durability and reliability, system field experience, and standards and codes.

  1. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  2. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  3. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  4. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect (OSTI)

    Lee, Hsien-Hsin S

    2010-05-11T23:59:59.000Z

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  5. Supervisory Control Strategies for Enhancing System Security and Privacy Christoforos N. Hadjicostis

    E-Print Network [OSTI]

    Hadjicostis, Christoforos

    cyber-infrastructures (ranging from defense and banking to health care and power distribution sys- temsSupervisory Control Strategies for Enhancing System Security and Privacy Christoforos N. Hadjicostis Abstract-- Enhancing the security and reliability of auto- mated systems that control vital

  6. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  7. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  8. Using Dynamic Sets to OvercomeHigh U 0 LatenciesDuring Search David Steere M. Satyanarayanan

    E-Print Network [OSTI]

    Satyanarayanan, Mahadev "Satya"

    with the increasing mismatch between CPU and disk speeds in high-performance com- puting systems. As another exampleUsing Dynamic Sets to OvercomeHigh U 0 LatenciesDuring Search David Steere M. Satyanarayanan School to search applications. These benejitsinclude greater oppor- tunity in the I/O subsystem

  9. Storage Performance Virtualization via Throughput and Latency Control Jianyong Zhang Alma Riska Anand Sivasubramaniam Qian Wang Erik Riedel

    E-Print Network [OSTI]

    Riska, Alma

    Storage Performance Virtualization via Throughput and Latency Control Jianyong Zhang Alma Riska and managing storage systems. A consequence of this trend is the need to serve multiple users that can be built on top of an existing storage utility. This frame- work uses a low-level feedback

  10. NaNet: a Low-Latency, Real-Time, Multi-Standard Network Interface Card with GPUDirect Features

    E-Print Network [OSTI]

    Lonardo, A; Ammendola, R; Biagioni, A; Frezza, O; Lamanna, G; Cicero, F Lo; Martinelli, M; Paolucci, P S; Pastorelli, E; Pontisso, L; Rossetti, D; Simeone, F; Simula, F; Sozzi, M; Tosoratto, L; Vicini, P

    2014-01-01T23:59:59.000Z

    While the GPGPU paradigm is widely recognized as an effective approach to high performance computing, its adoption in low-latency, real-time systems is still in its early stages. Although GPUs typically show deterministic behaviour in terms of latency in executing computational kernels as soon as data is available in their internal memories, assessment of real-time features of a standard GPGPU system needs careful characterization of all subsystems along data stream path. The networking subsystem results in being the most critical one in terms of absolute value and fluctuations of its response latency. Our envisioned solution to this issue is NaNet, a FPGA-based PCIe Network Interface Card (NIC) design featuring a configurable and extensible set of network channels with direct access through GPUDirect to NVIDIA Fermi/Kepler GPU memories. NaNet design currently supports both standard - GbE (1000BASE-T) and 10GbE (10Base-R) - and custom - 34~Gbps APElink and 2.5~Gbps deterministic latency KM3link - channels, bu...

  11. 1214 IEEE PHOTONICS TECHNOLOGY LETTERS, VOL. 14, NO. 8, AUGUST 2002 Optical Pump-Probe Measurements of the Latency of

    E-Print Network [OSTI]

    Miller, David A. B.

    -00-1-0024) through the University of New Mexico, and by DARPA/MARCO under the Interconnect Focus Center through of the Latency of Silicon CMOS Optical Interconnects Gordon A. Keeler, Student Member, IEEE, Diwakar Agarwal-integrated optoelectronic/silicon complementary metal­oxide­semicon- ductor (CMOS) chip designed for optical interconnection

  12. 988 IEEE COMMUNICATIONS LETTERS, VOL. 9, NO. 11, NOVEMBER 2005 Modeling TCP Long File Transfer Latency over

    E-Print Network [OSTI]

    Kansas, University of

    . However, TCP connections may be running over a multilink connection that aggregates the bandwidth latency for a long transfer. The performance model is experimentally evaluated by running TCP over MLPPP connections is predicted using the proposed model by varying the call drop rate and the packet loss

  13. Use of a hybrid technology in a critical security system.

    SciTech Connect (OSTI)

    Trujillo, David J.

    2010-10-01T23:59:59.000Z

    Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

  14. Use of a hybrid technology in a critical security system.

    SciTech Connect (OSTI)

    Scharmer, Carol; Trujillo, David J.

    2010-08-01T23:59:59.000Z

    Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

  15. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  16. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  17. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  18. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  19. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  20. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  1. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  3. Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks

    E-Print Network [OSTI]

    Han, Richard Y.

    amount of overhead to a conventional non-secure reprogramming scheme, namely Deluge, and are therefore. For example, the Deluge code propagation protocol [12] implements a three phase Advertise-Request- Data polite is necessary is transmitted. Deluge benefits from a soft state design in that, as data is reliably flooded hop

  4. A Reliable Fault-Tolerant Scheduling Algorithm for Real Time Embedded Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    /EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security, Toulouse : France (2013)" #12;2 Chafik Arar, Hamoudi Kalla, Salim Kalla, and Hocine Riadh Scheduling algorithm architecture specification distribution constraints

  5. NNSA PRISM Center for Prediction of Reliability, Integrity and Survivability of Microsystems

    E-Print Network [OSTI]

    Ginzel, Matthew

    NNSA PRISM Center for Prediction of Reliability, Integrity and Survivability of Microsystems NEED Mexico will collaborate in PRISM. Purdue is one of five centers funded under NNSA's Predictive Science Nuclear Security Administration (NNSA) $4.2 million in matching funds from Purdue and its partners

  6. A Scalable Approach for Reliable Downstream Data Delivery in Wireless Sensor Networks

    E-Print Network [OSTI]

    Sivakumar, Raghupathy

    based simulations, we evaluate the proposed framework. Categories and Subject Descriptors C.2 the spe- cific application the sensor network is used for. Consider a security application where imageA Scalable Approach for Reliable Downstream Data Delivery in Wireless Sensor Networks Seung

  7. Photovoltaics performance and reliability workshop

    SciTech Connect (OSTI)

    Mrig, L. (ed.) [ed.

    1992-01-01T23:59:59.000Z

    This document consists of papers and viewgraphs compiled from the proceedings of a workshop held in September 1992. This workshop was the fifth in a series sponsored by NREL/DOE under the general subject areas of photovoltaic module testing and reliability. PV manufacturers, DOE laboratories, electric utilities and others exchanged technical knowledge and field experience. The topics of cell and module characterization, module and system performance, materials and module durability/reliability research, solar radiation, and applications are discussed.

  8. Photovoltaics performance and reliability workshop

    SciTech Connect (OSTI)

    Mrig, L. [ed.] [ed.

    1992-11-01T23:59:59.000Z

    This document consists of papers and viewgraphs compiled from the proceedings of a workshop held in September 1992. This workshop was the fifth in a series sponsored by NREL/DOE under the general subject areas of photovoltaic module testing and reliability. PV manufacturers, DOE laboratories, electric utilities and others exchanged technical knowledge and field experience. The topics of cell and module characterization, module and system performance, materials and module durability/reliability research, solar radiation, and applications are discussed.

  9. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  10. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  11. Constructing Reliable Distributed Communication Systems with CORBA

    E-Print Network [OSTI]

    Schmidt, Douglas C.

    Constructing Reliable Distributed Communication Systems with CORBA Silvano Maffeis Douglas C model to support reliable data- and process- oriented distributed systems that communicate through syn distributed object computing systems with CORBA. First, we examine the question of whether reliable applica

  12. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  13. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  14. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  15. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  16. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  17. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  18. Latency Hiding in Dynamic Partitioning and Load Balancing of Grid Computing Applications

    E-Print Network [OSTI]

    Harvey, Dan

    , and the interconnect speeds are parameterized to derive conditions under which the IPG would be suitable for parallel are achieved when the nodes of the IPG are connected by a high­speed asynchronous interconnection network. I Agreement Number NCC 2­5393. mechanisms for sharing remote resources, provides adequate security, and allows

  19. Low latency, high bandwidth data communications between compute nodes in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2010-11-02T23:59:59.000Z

    Methods, parallel computers, and computer program products are disclosed for low latency, high bandwidth data communications between compute nodes in a parallel computer. Embodiments include receiving, by an origin direct memory access (`DMA`) engine of an origin compute node, data for transfer to a target compute node; sending, by the origin DMA engine of the origin compute node to a target DMA engine on the target compute node, a request to send (`RTS`) message; transferring, by the origin DMA engine, a predetermined portion of the data to the target compute node using memory FIFO operation; determining, by the origin DMA engine whether an acknowledgement of the RTS message has been received from the target DMA engine; if the an acknowledgement of the RTS message has not been received, transferring, by the origin DMA engine, another predetermined portion of the data to the target compute node using a memory FIFO operation; and if the acknowledgement of the RTS message has been received by the origin DMA engine, transferring, by the origin DMA engine, any remaining portion of the data to the target compute node using a direct put operation.

  20. Distributed Reliable Object-Oriented Programming (DROOP)

    E-Print Network [OSTI]

    Guerraoui, Rachid

    Distributed Reliable Object-Oriented Programming (DROOP) P. Eugster November 3, 2003 Abstract with such failures, coining the term Distributed Reliable Object-Oriented Programming (DROOP). 1 SCOOP

  1. Thermoelectric Materials By Design: Mechanical Reliability (Agreement...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    By Design: Mechanical Reliability (Agreement 14957) Thermoelectric Materials By Design: Mechanical Reliability (Agreement 14957) Presentation from the U.S. DOE Office of Vehicle...

  2. PEEM Thermal Stress and Reliability (Presentation)

    SciTech Connect (OSTI)

    O'Keefe, M. P.

    2007-11-08T23:59:59.000Z

    Advancing power electronics thermal stress and reliability is a critical factor in power electronics equipment. NREL aims to improve thermal stress and reliability of power electronics technologies.

  3. Distributed Generation Operational Reliability and Availability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reliability and Availability Database, Final Report, January 2004 Distributed Generation Operational Reliability and Availability Database, Final Report, January 2004 This final...

  4. Recommendations to Address Power Reliability Concerns Raised...

    Energy Savers [EERE]

    Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns Raised as a...

  5. Sandia National Laboratories: photovoltaic plant reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    photovoltaic plant reliability Sandia-Electric Power Research Institute Partnership Publishes Photovoltaic Reliability Report On January 21, 2014, in Energy, Facilities, Grid...

  6. Sandia National Laboratories: national reliability database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    national reliability database Third Annual Continuous Reliability Enhancement for Wind (CREW) Database Report Now Available On October 17, 2013, in Energy, News, News & Events,...

  7. Smart Grid Investments Improve Grid Reliability, Resilience,...

    Office of Environmental Management (EM)

    Investments Improve Grid Reliability, Resilience, and Storm Responses (November 2014) Smart Grid Investments Improve Grid Reliability, Resilience, and Storm Responses (November...

  8. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  9. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  10. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  11. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  12. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  13. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  14. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  15. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  16. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  17. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  18. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  19. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  20. Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Horace P. Yuen

    2014-05-07T23:59:59.000Z

    In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

  1. National Center for Nuclear Security - NCNS

    SciTech Connect (OSTI)

    None

    2014-11-12T23:59:59.000Z

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  2. National Center for Nuclear Security - NCNS

    ScienceCinema (OSTI)

    None

    2015-01-09T23:59:59.000Z

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  3. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  4. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  5. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  6. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  7. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  8. Ris-R-1235(EN) Reliability Databases

    E-Print Network [OSTI]

    .1 ISO standard: Gas and Oil - Collection of Reliability and Maintenance Data for Equipment 17 5.2 EDF standard for collection of reliability and maintenance data for equipment (also called MCD ­ Mode et Cause judgements on new equipment reliability parameters or using standard values or standard reliability models (e

  9. The design of a reliable reputation system

    E-Print Network [OSTI]

    Swamynathan, Gayatri; Almeroth, Kevin C.; Zhao, Ben Y.

    2010-01-01T23:59:59.000Z

    reliability by spreading its transactions evenly across all 20 peers in the system (shown by Distribution

  10. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  11. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  12. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  13. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  15. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  16. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  17. Photovoltaic performance and reliability workshop

    SciTech Connect (OSTI)

    Kroposki, B.

    1996-10-01T23:59:59.000Z

    This proceedings is the compilation of papers presented at the ninth PV Performance and Reliability Workshop held at the Sheraton Denver West Hotel on September 4--6, 1996. This years workshop included presentations from 25 speakers and had over 100 attendees. All of the presentations that were given are included in this proceedings. Topics of the papers included: defining service lifetime and developing models for PV module lifetime; examining and determining failure and degradation mechanisms in PV modules; combining IEEE/IEC/UL testing procedures; AC module performance and reliability testing; inverter reliability/qualification testing; standardization of utility interconnect requirements for PV systems; need activities to separate variables by testing individual components of PV systems (e.g. cells, modules, batteries, inverters,charge controllers) for individual reliability and then test them in actual system configurations; more results reported from field experience on modules, inverters, batteries, and charge controllers from field deployed PV systems; and system certification and standardized testing for stand-alone and grid-tied systems.

  18. Wind turbine reliability database update.

    SciTech Connect (OSTI)

    Peters, Valerie A.; Hill, Roger Ray; Stinebaugh, Jennifer A.; Veers, Paul S.

    2009-03-01T23:59:59.000Z

    This report documents the status of the Sandia National Laboratories' Wind Plant Reliability Database. Included in this report are updates on the form and contents of the Database, which stems from a fivestep process of data partnerships, data definition and transfer, data formatting and normalization, analysis, and reporting. Selected observations are also reported.

  19. FIELD RELIABILITY OF ELECTRONIC SYSTEMS

    E-Print Network [OSTI]

    study of in-the-field experience of electronics reliability. Tage Elm. Abstract. This report and internally) induced failures. The report is not meant to be merely an indication of the state of the art for the re- liability prediction methods we know, but also as a contribution to the investigation of man-machine

  20. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  1. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  2. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  3. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  4. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01T23:59:59.000Z

    appropriate security indices for the natural gas sector. Insecurity in the electricity sector, a primary emphasis in natural gas

  5. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01T23:59:59.000Z

    appropriate security indices for the natural gas sector. Insecurity in the electricity sector, a primary emphasis in natural gas

  6. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  7. Real Time Grid Reliability Management 2005

    E-Print Network [OSTI]

    Eto, Joe

    2008-01-01T23:59:59.000Z

    implementation of on-line power flow and security analysis,Line Contingency Filtering Scheme for Dynamic Security Assessment," IEEE Transactions on PowerPower Systems PSCE’2004, Iowa State University, Ames, Iowa, September [116] “Voltage Stability/Security Assessment and On-Line

  8. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  9. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  10. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  11. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  12. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  13. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  14. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  15. Gearbox Reliability Collaborative Bearing Calibration

    SciTech Connect (OSTI)

    van Dam, J.

    2011-10-01T23:59:59.000Z

    NREL has initiated the Gearbox Reliability Collaborative (GRC) to investigate the root cause of the low wind turbine gearbox reliability. The GRC follows a multi-pronged approach based on a collaborative of manufacturers, owners, researchers and consultants. The project combines analysis, field testing, dynamometer testing, condition monitoring, and the development and population of a gearbox failure database. At the core of the project are two 750kW gearboxes that have been redesigned and rebuilt so that they are representative of the multi-megawatt gearbox topology currently used in the industry. These gearboxes are heavily instrumented and are tested in the field and on the dynamometer. This report discusses the bearing calibrations of the gearboxes.

  16. Power Reliability at BASF Corporation

    E-Print Network [OSTI]

    Theising, T. R.

    2011-01-01T23:59:59.000Z

    Power Reliability at BASF Corporation Thomas R. Theising Energy Systems Manager BASF Corporation ABSTRACT: Quality is defined not as what the supplier puts into the product but what the customer gets out and is willing to pay for. Power.... INTRODUCTION: BASF often identifies its? power quality by the effects it has on its ability to manufacture products. Improvements are made to remedy the power quality problems either through the elimination of the problems or through some means...

  17. Power Reliability at BASF Corporation

    E-Print Network [OSTI]

    Theising, T. R.

    2012-01-01T23:59:59.000Z

    Power Reliability at BASF Corporation Thomas R. Theising Energy Systems Manager BASF Corporation ABSTRACT: Quality is defined not as what the supplier puts into the product but what the customer gets out and is willing to pay for. Power.... INTRODUCTION: BASF often identifies its? power quality by the effects it has on its ability to manufacture products. Improvements are made to remedy the power quality problems either through the elimination of the problems or through some means...

  18. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  19. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  20. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  1. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  3. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  5. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  6. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  7. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  8. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  9. Reliability Assessment Incorporating Operational Considerations and Economic

    E-Print Network [OSTI]

    PSERC Reliability Assessment Incorporating Operational Considerations and Economic Aspects Engineering Research Center Reliability Assessment Incorporating Operational Considerations and Economic and Economic Aspects for Large Interconnected Grids." We express our appreciation for the support provided

  10. Electric Power Reliability in Chemical Plants

    E-Print Network [OSTI]

    Cross, M. B.

    The quality and reliability of utility-generated electric power is presently receiving a great deal of attention from the chemical and refining industry. What changes have taken place to make electric power reliability a major topic of discussion...

  11. Arnold Schwarzenegger REAL-TIME GRID RELIABILITY

    E-Print Network [OSTI]

    Energy Research (PIER) California Energy Commission Beth Chambers Contract Manager Jamie Patterson (VSA) prototype to monitor system voltage conditions and provide real time dispatchers with reliabilityArnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT California ISO Real

  12. Data Communication Principles Reliable Data Transfer

    E-Print Network [OSTI]

    Ramkumar, Mahalingam

    Data Communication Principles Switching Reliable Data Transfer Data Communication Basics Mahalingam Ramkumar Mississippi State University, MS September 8, 2014 Ramkumar CSE 4153 / 6153 #12;Data Communication Principles Switching Reliable Data Transfer 1 Data Communication Principles Data Rate of a Communication

  13. Reliability Analysis of Microelectronic Components and Materials

    E-Print Network [OSTI]

    Berlin,Technische Universität

    1 Reliability Analysis of Microelectronic Components and Materials Increasing numbers on the structural integrity of embedded micro- electronic components and assemblies. Improved knowledge and modeling methods are critical for the reliable use of electronic packages. In particular, since the advent

  14. Electric Power Reliability in Chemical Plants 

    E-Print Network [OSTI]

    Cross, M. B.

    1989-01-01T23:59:59.000Z

    at plants across the country? Has the quality and reliability of utility-generated power deteriorated over the past five or ten years? Or, has the perception of what constitutes reliable power changed with the advent, installation, and increasing usage...

  15. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  16. Distributed Generation Operational Reliability, Executive Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2004 This report summarizes the results of the project, "Distributed Generation Market Transformation Tools: Distributed Generation Reliability and Availability Database,"...

  17. Reliability Challenges for Solar Energy (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.

    2009-12-08T23:59:59.000Z

    Presentation that reviews reliability issues related to various types of photovoltaic tecnnologies, including crystalline silicon, thin films, and concentrating PV.

  18. LUNAR MASS SPECTROMETER RELIABILITY LOGIC DIAGRAM

    E-Print Network [OSTI]

    Rathbun, Julie A.

    point (A) to (F). The block diagram also defines the reliability functions for the purpose of FMEA 1

  19. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  20. Reliability-based casing design

    SciTech Connect (OSTI)

    Maes, M.A. [Univ. of Calgary, Alberta (Canada). Civil Engineering Dept.; Gulati, K.C.; Johnson, R.C. [Mobil Research and Development Corp., Dallas, TX (United States); McKenna, D.L. [Mobil Producing Nigeria, Lagos (Nigeria); Brand, P.R.; Lewis, D.B. [Mobil E and P Technical Center, Dallas, TX (United States)

    1995-06-01T23:59:59.000Z

    The present paper describes the development of reliability-based design criteria for oil and/or gas well casing/tubing. The approach is based on the fundamental principles of limit state design. Limit states for tubulars are discussed and specific techniques for the stochastic modeling of loading and resistance variables are described. Zonation methods and calibration techniques are developed which are geared specifically to the characteristic tubular design for both hydrocarbon drilling and production applications. The application of quantitative risk analysis to the development of risk-consistent design criteria is shown to be a major and necessary step forward in achieving more economic tubular design.

  1. Dispatcher Reliability Analysis : SPICA-RAIL Experiments

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    consider that humans are fully reliable. But experience shows that many accidents involve human failuresDispatcher Reliability Analysis : SPICA-RAIL Experiments Fabien Belmonte, Jean-Louis Boulanger of scenarios and evaluate the behaviour of human operators. A state of the art in human reliability is pre

  2. RELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION

    E-Print Network [OSTI]

    Beckermann, Christoph

    RELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION Richard Hardin1 , K.K. Choi1 , and Christoph 52242-1527 Keywords: Casting Process Design, Optimization, Reliability-Based Design Optimization purpose reliability-based design optimization (RBDO) software tool previously developed at the University

  3. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  4. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  5. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  6. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  7. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  8. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  9. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  10. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  11. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  12. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  13. Human Reliability Program 10 CFR, part 712 Subpart B Medical Standards

    Broader source: Energy.gov [DOE]

    HRP Policy is the responsibility of the Office of Departmental Personnel Security Policy (HS-1.4). The Office of Worker Safety and Health Assistance (HS-12), has responsibility within the DOE Human Reliability Programs (HRP) to ensure appropriate policies and procedures are in place and used at HQ and the DOE sites to monitor HRP-designated worker's health and fitness-for-duty.

  14. OPTIMAL RELIABILITY ALLOCATION IN SERIES-PARALLEL SYSTEMS FROM COMPONENTS' DISCRETE COST -RELIABILITY DATA SETS

    E-Print Network [OSTI]

    Smith, Alice E.

    is not known. Instead, we consider the more realistic assumption of discrete cost-reliability data sets expressions for cost-reliability curves, we consider discrete cost-reliability data sets for each componentOPTIMAL RELIABILITY ALLOCATION IN SERIES-PARALLEL SYSTEMS FROM COMPONENTS' DISCRETE COST

  15. Software reliability models for critical applications

    SciTech Connect (OSTI)

    Pham, H.; Pham, M.

    1991-12-01T23:59:59.000Z

    This report presents the results of the first phase of the ongoing EG G Idaho, Inc. Software Reliability Research Program. The program is studying the existing software reliability models and proposes a state-of-the-art software reliability model that is relevant to the nuclear reactor control environment. This report consists of three parts: (1) summaries of the literature review of existing software reliability and fault tolerant software reliability models and their related issues, (2) proposed technique for software reliability enhancement, and (3) general discussion and future research. The development of this proposed state-of-the-art software reliability model will be performed in the second place. 407 refs., 4 figs., 2 tabs.

  16. Software reliability models for critical applications

    SciTech Connect (OSTI)

    Pham, H.; Pham, M.

    1991-12-01T23:59:59.000Z

    This report presents the results of the first phase of the ongoing EG&G Idaho, Inc. Software Reliability Research Program. The program is studying the existing software reliability models and proposes a state-of-the-art software reliability model that is relevant to the nuclear reactor control environment. This report consists of three parts: (1) summaries of the literature review of existing software reliability and fault tolerant software reliability models and their related issues, (2) proposed technique for software reliability enhancement, and (3) general discussion and future research. The development of this proposed state-of-the-art software reliability model will be performed in the second place. 407 refs., 4 figs., 2 tabs.

  17. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  18. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  19. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  20. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  1. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  2. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  3. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  4. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  5. Real Time Grid Reliability Management 2005

    E-Print Network [OSTI]

    Eto, Joe

    2008-01-01T23:59:59.000Z

    in AC/DC power systems, Electrical Energy & Power Systems,Security Regions of Electrical Power Systems”, ProceedingsRegions of Electrical Power Systems by Power Perturbation

  6. Real Time Grid Reliability Management 2005

    E-Print Network [OSTI]

    Eto, Joe

    2008-01-01T23:59:59.000Z

    Reactive Power Reserve Work Group, Western ElectricityReactive Voltage Security Assessment Wide Area Network Western Area Power Administration Western Electricity

  7. Electricity Delivery and Energy Reliability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Electricity Delivery and Energy Reliability Electricity Delivery and Energy Reliability information about the delivery of electricity and energy reliability Electricity Delivery...

  8. Reliable computation of homogeneous azeotropes

    SciTech Connect (OSTI)

    Maier, R.W.; Brennecke, J.F.; Stadtherr, M.A. [Univ. of Notre Dame, IN (United States). Dept. of Chemical Engineering] [Univ. of Notre Dame, IN (United States). Dept. of Chemical Engineering

    1998-08-01T23:59:59.000Z

    It is important to determine the existence and composition of homogeneous azeotropes in the analysis of phase behavior and in the synthesis and design of separation systems, from both theoretical and practical standpoints. A new method for reliably locating any and all homogeneous azeotropes for multicomponent mixtures is presented. The method also verifies the nonexistence of homogeneous azeotropes if none are present. The method is based on interval analysis, in particular an interval-Newton/generalized-bisection-algorithm providing a mathematical and computational guarantee that all azeotropes are located. This general-purpose technique can be applied in connection with any thermodynamic models. The technique is illustrated in several example problems using the Wilson, NRTL, and UNIQUAC activity-coefficient models.

  9. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  10. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  11. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  12. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  13. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  14. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  15. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  16. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  17. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  18. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  19. Secure Interoperable Open Smart Grid Demonstration Project

    SciTech Connect (OSTI)

    Magee, Thoman

    2014-12-31T23:59:59.000Z

    The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG. The SGDP enables the efficient, flexible integration of these disparate resources and lays the architectural foundations for future scalability. Con Edison assembled an SGDP team of more than 16 different project partners, including technology vendors, and participating organizations, and the Con Edison team provided overall guidance and project management. Project team members are listed in Table 1-1.

  20. Security and Fault-tolerance in Distributed Systems ETHZ, Spring 2013 Christian Cachin, IBM Research -Zurich www.zurich.ibm.com/~cca/

    E-Print Network [OSTI]

    Cachin, Christian

    Security and Fault-tolerance in Distributed Systems ETHZ, Spring 2013 Christian Cachin, IBM and secure distributed systems. · Exploit replication as the primary means to tolerate faults. · Describe. Dependability 2. Reliable broadcast 3. Distributed storage 4. Consensus 5. System examples 6. Distributed

  1. Security and Fault-tolerance in Distributed Systems ETHZ, Spring 2012 Christian Cachin, IBM Research -Zurich www.zurich.ibm.com/~cca/

    E-Print Network [OSTI]

    Cachin, Christian

    Security and Fault-tolerance in Distributed Systems ETHZ, Spring 2012 Christian Cachin, IBM and secure distributed systems. · Exploit replication as the primary means to tolerate faults. · Describe. Dependability 2. Communication primitives 3. Reliable broadcast 4. Distributed storage 5. Consensus 6

  2. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01T23:59:59.000Z

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  3. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  4. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  5. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  6. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  7. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  8. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  9. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  10. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  11. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  12. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  13. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  14. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  15. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  16. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  17. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  18. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  19. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  20. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  1. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  2. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  3. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  5. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  6. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  7. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  10. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  11. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  12. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  13. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  14. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  15. An integrated security framework for GOSS power grid analytics platform

    SciTech Connect (OSTI)

    Gibson, Tara D.; Ciraci, Selim; Sharma, Poorva; Allwardt, Craig H.; Rice, Mark J.; Akyol, Bora A.

    2014-06-23T23:59:59.000Z

    In power grid operations, security is an essential component for any middleware platform. Security protects data against unwanted access as well as cyber attacks. GridOpticsTM Software System (GOSS) is an open source power grid analytics platform that facilitates ease of access between applications and data sources and promotes development of advanced analytical applications. GOSS contains an API that abstracts many of the difficulties in connecting to various heterogeneous data sources. A number of applications and data sources have already been implemented to demonstrate functionality and ease of use. A security framework has been implemented which leverages widely accepted, robust JavaTM security tools in a way such that they can be interchanged as needed. This framework supports the complex fine-grained, access control rules identified for the diverse data sources already in GOSS. Performance and reliability are also important considerations in any power grid architecture. An evaluation is done to determine the overhead cost caused by security within GOSS and ensure minimal impact to performance.

  16. Power as a function of reliability

    SciTech Connect (OSTI)

    Abate, M.L. [Sandia National Labs., Albuquerque, NM (United States); McCabe, G.P.; Lynch, M.P. [Purdue Univ., Lafayette, IN (United States)

    1995-10-01T23:59:59.000Z

    Many studies employ multiple measurement instruments such as human raters, observers, judges, or mechanical gauges to record subject data. It is well known that the consistency of these instruments, commonly called rater reliability, limits the extent to which conclusions should be drawn from the observed data. However, the degree to which rater reliability limits conclusions has traditionally been assessed in only subjective manners. In this paper, a method is developed for objectively quantifying the impact of rate reliability on the statistical analysis of data from a commonly used collection scheme. This method allows the inclusion of a reliability index in statistical power calculations and is an invaluable tool in the planning of experiments.

  17. General Order Ensuring Reliable Electric Service (Louisiana)

    Broader source: Energy.gov [DOE]

    The standards set forth herein have been developed to provide consumers, the Louisiana Public Service Commission, and jurisdictional electric utilities with a uniform method of ensuring reliable...

  18. Thermoelectric Materials By Design: Mechanical Reliability (Agreement...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    enable improvements in TE device design, optimization, and maximum reliability. * Next year will involve: - Continued TE material database generation. - TE modeling and...

  19. Improving Wind Turbine Gearbox Reliability: Preprint

    SciTech Connect (OSTI)

    Musial, W.; Butterfield, S.; McNiff, B.

    2007-06-01T23:59:59.000Z

    This paper describes a new research and development initiative to improve gearbox reliability in wind turbines begun at the National Renewable Energy Laboratory (NREL) in Golden, Colorado, USA.

  20. RTI International Develops SSL Luminaire Reliability Model |...

    Broader source: Energy.gov (indexed) [DOE]

    is developing and validating accelerated life testing (ALT) methodologies and a reliability model for predicting the lifetime of integrated solid-state lighting...

  1. Electricity Delivery and Energy Reliability PROGRAM DESCRIPTION

    Broader source: Energy.gov (indexed) [DOE]

    (PSA) program provides expert technical assistance to states, tribes and regions on electricity policies, programs and market mechanisms that increase access to reliable,...

  2. Sandia National Laboratories: Inverter Reliablity Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    simulations to look for corresponding changes in behavioral parameters of ... Inverter Reliability Program On December 18, 2012, in As scientists and engineers improve the...

  3. Sandia National Laboratories: PV Reliability Operations Maintenance...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Maintenance database Sandia-Electric Power Research Institute Partnership Publishes Photovoltaic Reliability Report On January 21, 2014, in Energy, Facilities, Grid...

  4. Sandia National Laboratories: PV Systems Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    fluid phenomena of internal inverter components, and their impact on ... Inverter Reliability Program On December 18, 2012, in As scientists and engineers improve the...

  5. NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL: Preliminary Disturbance...

    Office of Environmental Management (EM)

    Preliminary Disturbance Report The following information represents a partial sequence of events based upon Reliability Coordinator information available to NERC. It is not...

  6. Sandia Energy - Continuous Reliability Enhancement for Wind ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Enhancement for Wind (CREW): Project Update Home Renewable Energy Energy News Wind Energy News & Events Systems Analysis Continuous Reliability Enhancement for Wind (CREW):...

  7. Comments of North American Electric Reliability Corporation ...

    Broader source: Energy.gov (indexed) [DOE]

    currently developing a report, entitled "Reliability Consideration from Integration of Smart Grid" that will address many of the issues raised in the DOE RFI. North American...

  8. Sandia National Laboratories: Materials & Manufacturing Reliability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Materials & Manufacturing Reliability Program Biofouling Studies on Sandia's Marine Hydrokinetic Coatings Initiated at PNNL's Sequim Bay On June 26, 2014, in Energy, Materials...

  9. Assessment of microelectronics packaging for high temperature, high reliability applications

    SciTech Connect (OSTI)

    Uribe, F.

    1997-04-01T23:59:59.000Z

    This report details characterization and development activities in electronic packaging for high temperature applications. This project was conducted through a Department of Energy sponsored Cooperative Research and Development Agreement between Sandia National Laboratories and General Motors. Even though the target application of this collaborative effort is an automotive electronic throttle control system which would be located in the engine compartment, results of this work are directly applicable to Sandia`s national security mission. The component count associated with the throttle control dictates the use of high density packaging not offered by conventional surface mount. An enabling packaging technology was selected and thermal models defined which characterized the thermal and mechanical response of the throttle control module. These models were used to optimize thick film multichip module design, characterize the thermal signatures of the electronic components inside the module, and to determine the temperature field and resulting thermal stresses under conditions that may be encountered during the operational life of the throttle control module. Because the need to use unpackaged devices limits the level of testing that can be performed either at the wafer level or as individual dice, an approach to assure a high level of reliability of the unpackaged components was formulated. Component assembly and interconnect technologies were also evaluated and characterized for high temperature applications. Electrical, mechanical and chemical characterizations of enabling die and component attach technologies were performed. Additionally, studies were conducted to assess the performance and reliability of gold and aluminum wire bonding to thick film conductor inks. Kinetic models were developed and validated to estimate wire bond reliability.

  10. Competition and Reliability in North American Electricity Markets...

    Energy Savers [EERE]

    Electricity Markets Technical Workshop Competition and Reliability in North American Electricity Markets Technical Workshop Competition and Reliability in North American...

  11. PV Performance and Reliability Validation Capabilities at Sandia...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance and Reliability Validation Capabilities at Sandia National Laboratories PV Performance and Reliability Validation Capabilities at Sandia National Laboratories This...

  12. Evaluation of MHTGR fuel reliability

    SciTech Connect (OSTI)

    Wichner, R.P. [Oak Ridge National Lab., TN (United States); Barthold, W.P. [Barthold Associates, Inc., Knoxville, TN (United States)

    1992-07-01T23:59:59.000Z

    Modular High-Temperature Gas-Cooled Reactor (MHTGR) concepts that house the reactor vessel in a tight but unsealed reactor building place heightened importance on the reliability of the fuel particle coatings as fission product barriers. Though accident consequence analyses continue to show favorable results, the increased dependence on one type of barrier, in addition to a number of other factors, has caused the Nuclear Regulatory Commission (NRC) to consider conservative assumptions regarding fuel behavior. For this purpose, the concept termed ``weak fuel`` has been proposed on an interim basis. ``Weak fuel`` is a penalty imposed on consequence analyses whereby the fuel is assumed to respond less favorably to environmental conditions than predicted by behavioral models. The rationale for adopting this penalty, as well as conditions that would permit its reduction or elimination, are examined in this report. The evaluation includes an examination of possible fuel-manufacturing defects, quality-control procedures for defect detection, and the mechanisms by which fuel defects may lead to failure.

  13. 978-1-4799-4394-4/14/$31.00 c 2014 IEEE Towards Energy Proportionality for Large-Scale Latency-Critical Workloads

    E-Print Network [OSTI]

    Kozyrakis, Christos

    978-1-4799-4394-4/14/$31.00 c 2014 IEEE Towards Energy Proportionality for Large-Scale Latency University Google, Inc. Abstract Reducing the energy footprint of warehouse-scale computer (WSC) systems is key to their affordability, yet difficult to achieve in practice. The lack of energy proportionality

  14. A 76.8 GB/s 46 mW Low-latency Network-on-Chip for Real-time Object Recognition Processor

    E-Print Network [OSTI]

    Yoo, Hoi-Jun

    has been widely used in various applications such as mobile robot navigation, autonomous vehicle consumption. The NoC is implemented in 0.13µm CMOS process and provides 76.8 GB/s aggregated bandwidth at 400 computing power and required complex data synchronization mechanism. In this paper, a low-latency and energy

  15. Reducing Damage Assessment Latency in Survivable Indrakshi Ray1, Ross M. McConnell1, Monte Lunacek1, and Vijay Kumar2

    E-Print Network [OSTI]

    Ray, Indrakshi

    Reducing Damage Assessment Latency in Survivable Databases Indrakshi Ray1, Ross M. McConnell1 on other data items can help spread the damage. To prevent the damage from spreading, it is important to assess the damage and confine it as quickly as possible. Algorithms providing fast damage assessment

  16. Abstract --The central performance problem in the World Wide Web, in recent years, is user perceived latency. This is the time

    E-Print Network [OSTI]

    Levy, Hanoch

    1 Abstract -- The central performance problem in the World Wide Web, in recent years, is user perceived latency. This is the time spent by a user while waiting for a Web page he/she requested. Im- patience with poor performance is the most common reason visitors terminate their visit at Web sites. For e

  17. Nevada National Security Site Groundwater Program

    ScienceCinema (OSTI)

    None

    2014-10-28T23:59:59.000Z

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  18. Using a Secure Mobile Object Kernel as Operating System on Embedded Devices to

    E-Print Network [OSTI]

    Binder, Walter

    Upload of Applications Walter Binder and Bal´azs Lichtl CoCo Software Engineering GmbH Margaretenstr. 22 and maintenance. The autonomous station relies on resource accounting and control in order to prevent an overuse of the design and architecture of an autonomous station, which is able to securely and reliably execute

  19. ME 379M-Nuclear Safety and Security ABET EC2000 syllabus

    E-Print Network [OSTI]

    Ben-Yakar, Adela

    ME 379M- Nuclear Safety and Security Page 1 ABET EC2000 syllabus ME 379M Nuclear Safety assessment models and nuclear non-proliferation. Failure classifications, failure modes, effects, and criticality analysis (FMECA), fault and event trees, reliability block diagrams. Specific areas from the code

  20. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  1. Software Reliability Cases: The Bridge Between Hardware, Software and System Safety and Reliability

    SciTech Connect (OSTI)

    Herrmann, D.S.; Peercy, D.E.

    1999-01-08T23:59:59.000Z

    High integrity/high consequence systems must be safe and reliable; hence it is only logical that both software safety and software reliability cases should be developed. Risk assessments in safety cases evaluate the severity of the consequences of a hazard and the likelihood of it occurring. The likelihood is directly related to system and software reliability predictions. Software reliability cases, as promoted by SAE JA 1002 and 1003, provide a practical approach to bridge the gap between hardware reliability, software reliability, and system safety and reliability by using a common methodology and information structure. They also facilitate early insight into whether or not a project is on track for meeting stated safety and reliability goals, while facilitating an informed assessment by regulatory and/or contractual authorities.

  2. Fundamental mechanisms of micromachine reliability

    SciTech Connect (OSTI)

    DE BOER,MAARTEN P.; SNIEGOWSKI,JEFFRY J.; KNAPP,JAMES A.; REDMOND,JAMES M.; MICHALSKE,TERRY A.; MAYER,THOMAS K.

    2000-01-01T23:59:59.000Z

    Due to extreme surface to volume ratios, adhesion and friction are critical properties for reliability of Microelectromechanical Systems (MEMS), but are not well understood. In this LDRD the authors established test structures, metrology and numerical modeling to conduct studies on adhesion and friction in MEMS. They then concentrated on measuring the effect of environment on MEMS adhesion. Polycrystalline silicon (polysilicon) is the primary material of interest in MEMS because of its integrated circuit process compatibility, low stress, high strength and conformal deposition nature. A plethora of useful micromachined device concepts have been demonstrated using Sandia National Laboratories' sophisticated in-house capabilities. One drawback to polysilicon is that in air the surface oxidizes, is high energy and is hydrophilic (i.e., it wets easily). This can lead to catastrophic failure because surface forces can cause MEMS parts that are brought into contact to adhere rather than perform their intended function. A fundamental concern is how environmental constituents such as water will affect adhesion energies in MEMS. The authors first demonstrated an accurate method to measure adhesion as reported in Chapter 1. In Chapter 2 through 5, they then studied the effect of water on adhesion depending on the surface condition (hydrophilic or hydrophobic). As described in Chapter 2, they find that adhesion energy of hydrophilic MEMS surfaces is high and increases exponentially with relative humidity (RH). Surface roughness is the controlling mechanism for this relationship. Adhesion can be reduced by several orders of magnitude by silane coupling agents applied via solution processing. They decrease the surface energy and render the surface hydrophobic (i.e. does not wet easily). However, only a molecular monolayer coats the surface. In Chapters 3-5 the authors map out the extent to which the monolayer reduces adhesion versus RH. They find that adhesion is independent of RH up to a threshold value, depending on the coating chemistry. The mechanism for the adhesion increase beyond this threshold value is that the coupling agent reconfigures from a surface to a bulk phase (Chapter 3). To investigate the details of how the adhesion increase occurs, the authors developed the mechanics for adhesion hysteresis measurements. These revealed that near-crack tip compression is the underlying cause of the adhesion increase (Chapter 4). A vacuum deposition chamber for silane coupling agent deposition was constructed. Results indicate that vapor deposited coatings are less susceptible to degradation at high RH (Chapter 5). To address issues relating to surfaces in relative motion, a new test structure to measure friction was developed. In contrast to other surface micromachined friction test structures, uniform apparent pressure is applied in the frictional contact zone (Chapter 6). The test structure will enable friction studies over a large pressure and dynamic range. In this LDRD project, the authors established an infrastructure for MEMS adhesion and friction metrology. They then characterized in detail the performance of hydrophilic and hydrophobic films under humid conditions, and determined mechanisms which limit this performance. These studies contribute to a fundamental understanding for MEMS reliability design rules. They also provide valuable data for MEMS packaging requirements.

  3. Senior Advisor for Cyber Security

    Broader source: Energy.gov [DOE]

    The mission of the Office of Electricity and Delivery and Energy Reliability (OE) is to lead national efforts to modernize the electric grid; increase grid capacity and reliability; improve energy...

  4. Demand Response and Electric Grid Reliability

    E-Print Network [OSTI]

    Wattles, P.

    2012-01-01T23:59:59.000Z

    Demand Response and Electric Grid Reliability Paul Wattles Senior Analyst, Market Design & Development, ERCOT CATEE Conference, Galveston October 10, 2012 2 North American Bulk Power Grids CATEE Conference October 10, 2012 ? The ERCOT... adequacy ? ?Achieving more DR participation would . . . displace some generation investments, but would achieve the same level of reliability... ? ?Achieving this ideal requires widespread demand response and market structures that enable loads...

  5. Wind Energy Facility Reliability and Maintenance

    E-Print Network [OSTI]

    Ding, Yu

    Wind Energy Facility Reliability and Maintenance Eunshin Byon, Lewis Ntaimo, Chanan Singh and Yu related to wind energy facility reliability and mainte- nance focused more on qualitative aspects. In this chapter, we provide a comprehensive account of the existing research regarding wind energy facility

  6. Probabilistic Reliable Message Transmission Subodh Kumar

    E-Print Network [OSTI]

    North Carolina at Chapel Hill, University of

    Probabilistic Reliable Message Transmission Subodh Kumar January 17, 1996 Abstract Most communication systems require reliable transmission of a sequence of messages over a physical network which can with messages by the sender and they are acknowledged by the receiver. It is known that protocols that use

  7. Advances in Safety, Reliability and Risk Management -Proceedings of the European Safety and Reliability Conference, ESREL 2011 -European Safety and Reliability Conference: Advances in Safety, Reliability and

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Advances in Safety, Reliability and Risk Management - Proceedings of the European Safety, Reliability and Risk Management, ESREL 2011, Troyes : France (2011) In France, more than 99% of failed is global risk management. This allows analysis of the major risks faced by the busi- ness (loss

  8. Engineering Reliability into Web Sites: Google SRE

    E-Print Network [OSTI]

    Tomkins, Andrew

    Engineering Reliability into Web Sites: Google SRE Alex Perry alex.perry@google.com Santa Monica SRE, Google #12;Abstract This talk introduces Site Reliability Engineering (SRE) at Google, explaining team responsibilities by site Failures and instability consuming manpower Engineering being applied

  9. : : ". RSST I Lunar Day Counter Reliability Analysis

    E-Print Network [OSTI]

    Rathbun, Julie A.

    : : ". RSST I Lunar Day Counter Reliability Analysis NO. ATM 846 PAGE 1 REV. MO. OF 10 DATE 12/3/69 This ATM presents a Reliability analysis of the Lunar Day Counter, the Resettable Solid State Timer (RSST equipment. The analysis is based on a parts count, average failure rates and two (2) years operation

  10. NISTIR 7817 A Credential Reliability and

    E-Print Network [OSTI]

    NISTIR 7817 A Credential Reliability and Revocation Model for Federated Identities Hildegard Ferraiolo http://dx.doi.org/10.6028/NIST.IR.7817 #12;NISTIR 7817 A Credential Reliability and Revocation Interagency Report 7817 22 pages (Nov. 2012) Certain commercial entities, equipment, or materials may

  11. Reliable Distributed Computing for Decision Support Systems

    E-Print Network [OSTI]

    Bargiela, Andrzej

    Reliable Distributed Computing for Decision Support Systems Taha Osman, Andrzej Bargiela Department of application tasks on the currently avail- able computing nodes. Distributed Systems Reliability Due decision-support systems such as water distribution net- works, involving hundreds or even thousands

  12. Reliability of underwater hearing thresholds in pinnipeds

    E-Print Network [OSTI]

    Reichmuth, Colleen

    Reliability of underwater hearing thresholds in pinnipeds Brandon L. Southall Long Marine and certain testing parameters (e.g., equipment and research personnel), measured underwater hearing (0.2­6.4 kHz). These data address the reliability of acoustic signal detection measurements over time

  13. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  14. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  15. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  16. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  17. NREL's Gearbox Reliability Collaborative leads to wind turbine gearbox reliability, lowering the cost of energy.

    E-Print Network [OSTI]

    the cost of energy. Unintended gearbox failures have a significant impact on the cost of wind farm will result in increased gearbox reliability and an overall reduction in the cost of wind energy. ProjectNREL's Gearbox Reliability Collaborative leads to wind turbine gearbox reliability, lowering

  18. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  19. Reliability and the Federal Energy Regulatory Commission

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—covers the Federal Energy Regulatory Commission (FERC) strategic plan, the Federal Power Act (FPA), current energy security posture, and more.

  20. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  1. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  2. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  3. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  4. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  5. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  6. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprise’s

  7. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  8. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  9. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  10. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  11. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    limit economic development, impact interdependent infrastructure (such as energy and agriculture), and are a fundamental source of ... Climate Security On May 13, 2011, in...

  12. Pollux | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Pollux | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  14. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  15. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from improved climate models to performance models for underground waste storage to 3D printing and digital rock physics. Marianne Walck (Director ... Recent Sandia Secure,...

  16. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  17. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  18. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  19. Extreme Scale Computing to Secure the Nation

    SciTech Connect (OSTI)

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10T23:59:59.000Z

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the absence of nuclear testing, a progam to: (1) Support a focused, multifaceted program to increase the understanding of the enduring stockpile; (2) Predict, detect, and evaluate potential problems of the aging of the stockpile; (3) Refurbish and re-manufacture weapons and components, as required; and (4) Maintain the science and engineering institutions needed to support the nation's nuclear deterrent, now and in the future'. This program continues to fulfill its national security mission by adding significant new capabilities for producing scientific results through large-scale computational simulation coupled with careful experimentation, including sub-critical nuclear experiments permitted under the CTBT. To develop the computational science and the computational horsepower needed to support its mission, SBSS initiated the Accelerated Strategic Computing Initiative, later renamed the Advanced Simulation & Computing (ASC) program (sidebar: 'History of ASC Computing Program Computing Capability'). The modern 3D computational simulation capability of the ASC program supports the assessment and certification of the current nuclear stockpile through calibration with past underground test (UGT) data. While an impressive accomplishment, continued evolution of national security mission requirements will demand computing resources at a significantly greater scale than we have today. In particular, continued observance and potential Senate confirmation of the Comprehensive Test Ban Treaty (CTBT) together with the U.S administration's promise for a significant reduction in the size of the stockpile and the inexorable aging and consequent refurbishment of the stockpile all demand increasing refinement of our computational simulation capabilities. Assessment of the present and future stockpile with increased confidence of the safety and reliability without reliance upon calibration with past or future test data is a long-term goal of the ASC program. This will be accomplished through significant increases in the scientific bases that underlie the computational tools. Computer codes must be de

  20. McMaster Security Services Annual Report 2009 1 Security Services

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services ­ Annual Report 2009 1 McMaster Security Services Annual Report 2009 #12;McMaster Security Services ­ Annual Report 2009 2 Mission Statement Developing a safe and secure to the Security Services Department. Methods and approaches to assist in achieving a safe and secure environment

  1. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAbout Us

  2. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1Resource forNational Cyber Security

  3. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8, 2000Consumption Survey (CBECS)Laboratory to HighlightSecurity Overview

  4. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuring

  5. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22, 2014SEC.

  6. Homeland Security Programs | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School football Highdefault Sign In About |PagesHomeland Security

  7. Low latency search for Gravitational waves from BH-NS binaries in coincidence with Short Gamma Ray Bursts

    E-Print Network [OSTI]

    Andrea Maselli; Valeria Ferrari

    2014-02-24T23:59:59.000Z

    We propose a procedure to be used in the search for gravitational waves from black hole-neutron star coalescing binaries, in coincidence with short gamma-ray bursts. It is based on two recently proposed semi-analytic fits, one reproducing the mass of the remnant disk surrounding the black hole which forms after the merging as a function of some binary parameters, the second relating the neutron star compactness, i.e. the ratio of mass and radius, with its tidal deformability. Using a Fisher matrix analysis and the two fits, we assign a probability that the emitted gravitational signal is associated to the formation of an accreting disk massive enough to supply the energy needed to power a short gamma ray burst. This information can be used in low-latency data analysis to restrict the parameter space searching for gravitational wave signals in coincidence with short gamma-ray bursts, and to gain information on the dynamics of the coalescing system and on the internal structure of the components. In addition, when the binary parameters will be measured with high accuracy, it will be possible to use this information to trigger the search for off-axis gamma-ray bursts afterglows.

  8. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  9. Adaptive Reliability Analysis of Excavation Problems

    E-Print Network [OSTI]

    Park, Jun Kyung

    2012-10-19T23:59:59.000Z

    . This analysis couples the adaptive design capabilities of the observational method with updated reliability indices, to be used in risk-based design decisions. A probabilistic framework is developed to predict three-dimensional deformation profiles due...

  10. Demand Response For Power System Reliability: FAQ

    SciTech Connect (OSTI)

    Kirby, Brendan J [ORNL

    2006-12-01T23:59:59.000Z

    Demand response is the most underutilized power system reliability resource in North America. Technological advances now make it possible to tap this resource to both reduce costs and improve. Misconceptions concerning response capabilities tend to force loads to provide responses that they are less able to provide and often prohibit them from providing the most valuable reliability services. Fortunately this is beginning to change with some ISOs making more extensive use of load response. This report is structured as a series of short questions and answers that address load response capabilities and power system reliability needs. Its objective is to further the use of responsive load as a bulk power system reliability resource in providing the fastest and most valuable ancillary services.

  11. Reliability-Based Optimization Using Evolutionary Algorithms

    E-Print Network [OSTI]

    Deb, Kalyanmoy

    Uncertainties in design variables and problem parameters are often inevitable and must be considered in an optimization task if reliable optimal solutions are sought. Besides a number of sampling techniques, there exist ...

  12. Reliability Challenges for Solar Energy (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.

    2009-04-27T23:59:59.000Z

    PV industry can benefit from reliability testing experience of microelectronics industry . Si modules perform well in field; CdTe/CIGS must be sealed to moisture; CPV in product development stage.

  13. PV Module Reliability Research (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-06-01T23:59:59.000Z

    This National Center for Photovoltaics sheet describes the capabilities of its PV module reliability research. The scope and core competencies and capabilities are discussed and recent publications are listed.

  14. Photovoltaic Reliability and Engineering (Revised) (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2011-06-01T23:59:59.000Z

    Capabilities fact sheet for the National Center for Photovoltaics: Photovoltaic Reliability and Engineering. One-sided sheet that includes Scope, Core Competencies and Capabilities, and Contact/Web information.

  15. Sandia National Laboratories: Physics of Reliability: Evaluating...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Physics of Reliability: Evaluating Design Insights for Component Technologies in Solar program Sandia R&D Funded under New DOE SunShot Program On November 27, 2013, in Energy,...

  16. Reliability Issues for Photovoltaic Modules (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.

    2009-10-01T23:59:59.000Z

    Si modules good in field; new designs need reliability testing. CdTe & CIGS modules sensitive to moisture; carefully seal. CPV in product development stage; benefits from expertise in other industries.

  17. Sandia National Laboratories: increase power system reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    reliability Sandia, DOE Energy Storage Program, GeneSiC Semiconductor, U.S. Army ARDEC: Ultra-High-Voltage Silicon Carbide Thyristors On March 29, 2013, in Capabilities,...

  18. RELIABILITY IMPROVEMENT OF BART TRAIN CONTROL

    E-Print Network [OSTI]

    Turner, D.B.

    2011-01-01T23:59:59.000Z

    equipment to resolve equipment reliability problems must bereliability problems was seen to be a mandatory first step in improving equipmentreliability of the Bay Area Rapid Tran- sit district's vehicle-borne Automatic Train Control equipment.

  19. On the internet grouping for reliable multicasting

    E-Print Network [OSTI]

    Ghanem, Mohamed M.

    1996-01-01T23:59:59.000Z

    ON THE INTERNET GROUPING FOR RELIABLE MULTICASTING A Thesis by MOHAMED M. GHANEM Submitted to the Office of Graduate Studies of Texas ARM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE May 1996... Major Subject: Computer Science ON THF, INTERNET GROUPING I'OR RELIABLE MULTICASTING A Thesis by MOHAMED M. GHANEM Submitted to Texas ASM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved...

  20. Reliability and Functional Availability of HVAC Systems

    E-Print Network [OSTI]

    Myrefelt, S.

    2004-01-01T23:59:59.000Z

    RELIABILITY AND FUNCTIONAL AVAILABILITY OF HVAC SYSTEMS Sonny Myrefelt Dep. of Build. Serv. Eng., KTH, 10044 Stockholm, Sweden, and SKANSKA Sydost, V?xj?, Sweden Summary This paper presents a model to calculate the reliability... system, therefore, there must be sufficient documentation of design airflow rates. The compulsory ventilation checks performed in Sweden have focused on the importance of maintaining the design air flow rates. More about this activity can be seen...