Sample records for lemnos interoperable security

  1. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  2. Lemnos Interoperable Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas »of EnergyLearning &LegacySecurity Program

  3. Lemnos Interoperable Security Program (May 2008) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report:40PMDepartment ofs o u t h e aThe Result TheLemnos

  4. Lemnos Interoperable Security Program (May 2008) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas »of EnergyLearning &LegacySecurity Program (May

  5. Lemnos Interoperable Security Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report:40PMDepartment ofs o u t h e aThe Result The

  6. Lemnos Interoperable Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report:40PMDepartment ofs o u t h e aThe Result

  7. Secure Interoperable Open Smart Grid Demonstration Project

    SciTech Connect (OSTI)

    Magee, Thoman

    2014-12-31T23:59:59.000Z

    The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG. The SGDP enables the efficient, flexible integration of these disparate resources and lays the architectural foundations for future scalability. Con Edison assembled an SGDP team of more than 16 different project partners, including technology vendors, and participating organizations, and the Con Edison team provided overall guidance and project management. Project team members are listed in Table 1-1.

  8. Context Interchange Mediation for Semantic Interoperability and Dynamic Integration of Autonomous Information Sources in the Fixed Income Securities Industry

    E-Print Network [OSTI]

    Siegel, Michael

    2003-02-10T23:59:59.000Z

    We examine semantic interoperability problems in the fixed income securities industry and propose a knowledge representation architecture for context interchange ...

  9. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  10. Interleaving Commands: a Threat to the Interoperability of Smartcard Based Security Applications

    E-Print Network [OSTI]

    Talamo, Maurizio; Schunck, Christian H; Arcieri, Franco

    2012-01-01T23:59:59.000Z

    Although smartcards are widely used, secure smartcard interoperability has remained a significant challenge. Usually each manufacturer provides a closed environment for their smartcard based applications including the microchip, associated firmware and application software. While the security of this "package" can be tested and certified for example based on the Common Criteria, the secure and convenient interoperability with other smartcards and smartcard applications is not guaranteed. Ideally one would have a middleware that can support various smartcards and smartcard applications. In our ongoing research we study this scenario with the goal to develop a way to certify secure smartcard interoperability in such an environment. Here we discuss and experimentally demonstrate one critical security problem: if several smartcards are connected via a middleware it is possible that a smartcard of type S receives commands that were supposed to be executed on a different smartcard of type S'. Such "external command...

  11. Microsoft Word - OE Cyber Release 10 18 07.doc

    Broader source: Energy.gov (indexed) [DOE]

    for security interoperability through the Lemnos Interoperable Security Program. * Siemens Corporate Research, Inc. of Princeton, NJ - selected for an award of up to 1.3...

  12. DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy...

    Office of Environmental Management (EM)

    for security interoperability through the Lemnos Interoperable Security Program. Siemens Corporate Research, Inc. of Princeton, NJ - selected for an award of up to 1.3...

  13. Lemnos Fact Sheet FINAL_3-15.cdr

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report:40PMDepartment ofs o u t h e aThe Result The Lemnos

  14. Elusive Quest for Interoperability

    E-Print Network [OSTI]

    Datta, Shoumen

    2006-01-01T23:59:59.000Z

    Interoperability between systems and adequate operational transparency may help stem some of the frustration of businesses dealing with customs. On the other hand, customs must remain vigilant to ensure security through ...

  15. Software interoperability for energy simulation

    E-Print Network [OSTI]

    Hitchcock, Robert J.

    2002-01-01T23:59:59.000Z

    Tools,” in Building Energy Simulation User News, Vol. 22,Interoperability for Energy Simulation Robert J. Hitchcock,Interoperability for Energy Simulation Robert J. Hitchcock,

  16. Interoperable PKI Data Distribution in Computational Grids

    SciTech Connect (OSTI)

    Pala, Massimiliano; Cholia, Shreyas; Rea, Scott A.; Smith, Sean W.

    2008-07-25T23:59:59.000Z

    One of the most successful working examples of virtual organizations, computational grids need authentication mechanisms that inter-operate across domain boundaries. Public Key Infrastructures(PKIs) provide sufficient flexibility to allow resource managers to securely grant access to their systems in such distributed environments. However, as PKIs grow and services are added to enhance both security and usability, users and applications must struggle to discover available resources-particularly when the Certification Authority (CA) is alien to the relying party. This article presents how to overcome these limitations of the current grid authentication model by integrating the PKI Resource Query Protocol (PRQP) into the Grid Security Infrastructure (GSI).

  17. Connected Buildings Interoperability Vision Webinar

    Broader source: Energy.gov [DOE]

    Connected Buildings Interoperability Vision Webinar slides, by Kevin Lynn, U.S. Department of Energy, May 20, 2015.

  18. Buildings to Grid Integration & Interoperability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buildings to Grid Integration & Interoperability Joe Hagerman, Senior Advisor DOE Building Technologies Office March 11, 2013 EERE: Office of Energy Efficiency and Renewable Energy...

  19. Smart Grid Interoperability Maturity Model

    SciTech Connect (OSTI)

    Widergren, Steven E.; Levinson, Alex; Mater, J.; Drummond, R.

    2010-04-28T23:59:59.000Z

    The integration of automation associated with electricity resources (including transmission and distribution automation and demand-side resources operated by end-users) is key to supporting greater efficiencies and incorporating variable renewable resources and electric vehicles into the power system. The integration problems faced by this community are analogous to those faced in the health industry, emergency services, and other complex communities with many stakeholders. To highlight this issue and encourage communication and the development of a smart grid interoperability community, the GridWise Architecture Council (GWAC) created an Interoperability Context-Setting Framework. This "conceptual model" has been helpful to explain the importance of organizational alignment in addition to technical and informational interface specifications for "smart grid" devices and systems. As a next step to building a community sensitive to interoperability, the GWAC is investigating an interoperability maturity model (IMM) based on work done by others to address similar circumstances. The objective is to create a tool or set of tools that encourages a culture of interoperability in this emerging community. The tools would measure status and progress, analyze gaps, and prioritize efforts to improve the situation.

  20. Advancing Smart Grid Interoperability and Implementing NIST's Interoperability Roadmap

    SciTech Connect (OSTI)

    Basso,T.; DeBlasio, R.

    2010-04-01T23:59:59.000Z

    The IEEE American National Standards project P2030TM addressing smart grid interoperability and the IEEE 1547 series of standards addressing distributed resources interconnection with the grid have been identified in priority action plans in the Report to NIST on the Smart Grid Interoperability Standards Roadmap. This paper presents the status of the IEEE P2030 development, the IEEE 1547 series of standards publications and drafts, and provides insight on systems integration and grid infrastructure. The P2030 and 1547 series of standards are sponsored by IEEE Standards Coordinating Committee 21.

  1. Interoperability and the Federal Role

    SciTech Connect (OSTI)

    Ton, Dan; Irwin, Chris; Widergren, Steven E.

    2010-07-25T23:59:59.000Z

    A smart grid is capable of integrating a broad array of generation resources and enables the participation of demand side resources in reliable system operation. To cost effectively realize this flexibility, the associated devices and systems need to connect and interact simply and reliably. Interoperability is the important ingredient to make this happen. Because the electric system transcends organizational boundaries between generators, electricity delivery companies, end-users, and other service providers, advancing interoperability between these organizations can be difficult to justify by individual organizations. But given the importance of a smart electric system to meet national economic, societal, and environmental objectives, a federal role is taking shape in the United States to improve the integration of automation elements and thus make smart grid a reality

  2. Interoperability Checklist for Decision-Makers

    SciTech Connect (OSTI)

    Melton, Ronald B.; Ambrosio, Ron

    2010-12-09T23:59:59.000Z

    In April 2007 the GridWise® Architecture Council published the Introduction to Interoperability and Decision-Maker’s Interoperability Checklist Version 1.0 as a tool to be used by policy makers and executives making smart grid policy or investment decisions. Subsequently there has been a significant amount of additional work on smart grid interoperability by the council and others. This paper summarizes the current efforts of the council to update the checklist to incorporate this subsequent work.

  3. Designing and managing Organizational Interoperability with organizational capabilities and roadmaps

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Designing and managing Organizational Interoperability with organizational capabilities organizational interoperability issues in through the study of two cases. Then it presents a framework which can help to design and manage this interoperability, by driving the development of "organizational

  4. Vehicle-Grid Interoperability | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vehicle-Grid Interoperability Charging a test vehicle using the laboratory's solar-powered charging station. Charging a test vehicle using the laboratory's solar-powered charging...

  5. Language Interoperability and Logic Programming Languages 

    E-Print Network [OSTI]

    Cook, Jonathan J

    We discuss P#, our implementation of a tool which allows interoperation between a concurrent superset of the Prolog programming language and C#. This enables Prolog to be used as a native implementation language for Microsoft's .NET platform. P...

  6. Maturity Model for Advancing Smart Grid Interoperability

    SciTech Connect (OSTI)

    Knight, Mark; Widergren, Steven E.; Mater, J.; Montgomery, Austin

    2013-10-28T23:59:59.000Z

    Abstract—Interoperability is about the properties of devices and systems to connect and work properly. Advancing interoperability eases integration and maintenance of the resulting interconnection. This leads to faster integration, lower labor and component costs, predictability of projects and the resulting performance, and evolutionary paths for upgrade. When specifications are shared and standardized, competition and novel solutions can bring new value streams to the community of stakeholders involved. Advancing interoperability involves reaching agreement for how things join at their interfaces. The quality of the agreements and the alignment of parties involved in the agreement present challenges that are best met with process improvement techniques. The GridWise® Architecture Council (GWAC) sponsored by the United States Department of Energy is supporting an effort to use concepts from capability maturity models used in the software industry to advance interoperability of smart grid technology. An interoperability maturity model has been drafted and experience is being gained through trials on various types of projects and community efforts. This paper describes the value and objectives of maturity models, the nature of the interoperability maturity model and how it compares with other maturity models, and experiences gained with its use.

  7. Modeling medical devices for plug-and-play interoperability

    E-Print Network [OSTI]

    Hofmann, Robert Matthew

    2007-01-01T23:59:59.000Z

    One of the challenges faced by clinical engineers is to support the connectivity and interoperability of medical-electrical point-of-care devices. A system that could enable plug-and-play connectivity and interoperability ...

  8. EV-Smart Grid Interoperability Center | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    state-of-the art tools to advance charging interoperability and global harmonization for electric vehicles. The EV-Interoperability Center at Argonne offers state-of-the art tools...

  9. Smart Grid Interoperability Maturity Model Beta Version

    SciTech Connect (OSTI)

    Widergren, Steven E.; Drummond, R.; Giroti, Tony; Houseman, Doug; Knight, Mark; Levinson, Alex; longcore, Wayne; Lowe, Randy; Mater, J.; Oliver, Terry V.; Slack, Phil; Tolk, Andreas; Montgomery, Austin

    2011-12-02T23:59:59.000Z

    The GridWise Architecture Council was formed by the U.S. Department of Energy to promote and enable interoperability among the many entities that interact with the electric power system. This balanced team of industry representatives proposes principles for the development of interoperability concepts and standards. The Council provides industry guidance and tools that make it an available resource for smart grid implementations. In the spirit of advancing interoperability of an ecosystem of smart grid devices and systems, this document presents a model for evaluating the maturity of the artifacts and processes that specify the agreement of parties to collaborate across an information exchange interface. You are expected to have a solid understanding of large, complex system integration concepts and experience in dealing with software component interoperation. Those without this technical background should read the Executive Summary for a description of the purpose and contents of the document. Other documents, such as checklists, guides, and whitepapers, exist for targeted purposes and audiences. Please see the www.gridwiseac.org website for more products of the Council that may be of interest to you.

  10. Is Interoperability Achievable With ODBC? Christoph Steindl

    E-Print Network [OSTI]

    Mössenböck, Hanspeter

    possible to work with different DBMS's 1 but how easy and convenient it is. We will show is a gain in database independence and interoperability. 1 DBMS ­ database management system 1 #12; 2 ODBC an application to connect to a DBMS, execute SQL statements, and retrieve results. Furthermore it defines

  11. Components Interoperability through Mediating Connector Patterns

    E-Print Network [OSTI]

    Spalazzese, Romina; 10.4204/EPTCS.37.3

    2010-01-01T23:59:59.000Z

    A key objective for ubiquitous environments is to enable system interoperability between system's components that are highly heterogeneous. In particular, the challenge is to embed in the system architecture the necessary support to cope with behavioral diversity in order to allow components to coordinate and communicate. The continuously evolving environment further asks for an automated and on-the-fly approach. In this paper we present the design building blocks for the dynamic and on-the-fly interoperability between heterogeneous components. Specifically, we describe an Architectural Pattern called Mediating Connector, that is the key enabler for communication. In addition, we present a set of Basic Mediator Patterns, that describe the basic mismatches which can occur when components try to interact, and their corresponding solutions.

  12. Telemedicine system interoperability architecture: concept description and architecture overview.

    SciTech Connect (OSTI)

    Craft, Richard Layne, II

    2004-05-01T23:59:59.000Z

    In order for telemedicine to realize the vision of anywhere, anytime access to care, it must address the question of how to create a fully interoperable infrastructure. This paper describes the reasons for pursuing interoperability, outlines operational requirements that any interoperability approach needs to consider, proposes an abstract architecture for meeting these needs, identifies candidate technologies that might be used for rendering this architecture, and suggests a path forward that the telemedicine community might follow.

  13. Formalization of Semantic Annotation for Systems Interoperability in a PLM environment

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Formalization of Semantic Annotation for Systems Interoperability in a PLM environment Yongxin Liao, and etc.) in the Product Lifecycle Man- agement (PLM) environment. These formal semantic annotations) interoperability context. Keywords: Ontology, Semantic Annotation, Systems Interoperability, Business Process, PLM

  14. EV-Smart Grid Research & Interoperability Activities 2014 DOE...

    Broader source: Energy.gov (indexed) [DOE]

    - Codes & Standards Support, Grid Connectivity R&D, International Cooperation and EV-Smart Grid Interoperability Center (funding began in FY 2013) Grid Integration * PEV J1772...

  15. Technical Meeting: Data/Communication Standards and Interoperability...

    Broader source: Energy.gov (indexed) [DOE]

    & ISOIEC 14908 (LonMark International) Presentation: Introducing Open Automated Demand Response (OpenADR) (Honeywell) Presentation: Consortium for SEP 2 Interoperability...

  16. Interoperable internet-scale security framework for RFID networks

    E-Print Network [OSTI]

    Mao, Tingting

    2008-01-01T23:59:59.000Z

    It is estimated that over 3 billion Radio Frequency Identification (RFID) tags have been deployed through 2007. Most tags are used in supply chains where the Electronic Product Code (EPC) and associated business event data ...

  17. 2012 SG Peer Review - Recovery Act: Secure Interoperable Open...

    Broader source: Energy.gov (indexed) [DOE]

    Project Objective Life-cycle Funding FY10 - FY13 45.4 m Technical Scope (Insert graphic here) 2 *Integrate Legacy and Smart Grid information systems *Integrate external...

  18. Open PCS Security Architecture For Interoperable Design (OPSAID) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014Funds for CleanAbout Energy.gov

  19. Open PCS Security Architecture For Interoperable Design (OPSAID) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin of Contamination in ManyDepartment ofOil's Impact onDepartment ofStorage atEnergy Series

  20. Draft NIST Framework and Roadmap4 Smart Grid Interoperability6

    E-Print Network [OSTI]

    Magee, Joseph W.

    1 2 3 Draft NIST Framework and Roadmap4 for5 Smart Grid Interoperability6 Standards,7 Release 2 and Roadmap28 for29 Smart Grid Interoperability30 Standards,31 Release 2.032 33 October 17, 2011 REVISION34 35....................................................................................... 2446 2. Smart Grid Visions

  1. Interoperability of Demand Response Resources Demonstration in NY

    SciTech Connect (OSTI)

    Wellington, Andre

    2014-03-31T23:59:59.000Z

    The Interoperability of Demand Response Resources Demonstration in NY (Interoperability Project) was awarded to Con Edison in 2009. The objective of the project was to develop and demonstrate methodologies to enhance the ability of customer sited Demand Response resources to integrate more effectively with electric delivery companies and regional transmission organizations.

  2. Pragmatic Type Interoperability Swiss Federal Institute of Technology (EPFL)

    E-Print Network [OSTI]

    Eugster, Patrick

    · Middleware for peer-to-peer (p2p) object sharing ­ Borrow/lend (BL) abstraction, publish/subscribe variant · Interoperability #12;4 Illustration public interface car { public Color getcolor(); public int getmaxspeed(); } Peer A car c = ... Peer B Peer C Peer D ? ? ? Car Car CAR #12;5 Interoperability · LI: "language

  3. Software Interoperability Tools: Standardized Capability-Profiling Methodology ISO16100

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Software Interoperability Tools: Standardized Capability-Profiling Methodology ISO16100 Michiko, qwang@seu.ac.jp Abstract. The ISO 16100 series has been developed for Manufacturing software for developing general software applications including enterprise applications. In this paper, ISO 16100

  4. EV-Smart Grid Interoperability Centers in Europe and the United...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    EV-Smart Grid Interoperability Centers in Europe and the United States The EV-Smart Grid Interoperability Centers at the U.S. Department of Energy's Argonne National Laboratory and...

  5. Opening Remarks by George W. Arnold, National Coordinator for Smart Grid Interoperability

    E-Print Network [OSTI]

    Magee, Joseph W.

    Opening Remarks by George W. Arnold, National Coordinator for Smart Grid Interoperability Conference on Smart Grid Interoperability Standards January 31, 2011 Introduction Chairman Wellinghoff the opportunity to escribe NIST's and our partners efforts to develop standards for an interoperable d smart grid

  6. READY4SmartCities ICT Roadmap and Data Interoperability for Energy Systems in Smart Cities

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    READY4SmartCities ­ ICT Roadmap and Data Interoperability for Energy Systems in Smart Cities and Data Interoperability for Energy Systems in Smart Cities Project Acronym: READY4SmartCities Grant of the Ready4SmartCities project is to support energy data interoperability in the context of SmartCities

  7. A Model of OASIS Role-Based Access Control and its Support for Active Security

    E-Print Network [OSTI]

    Cambridge, University of

    A Model of OASIS Role-Based Access Control and its Support for Active Security Walt Yao University.bacon@cl.cam.ac.uk ABSTRACT OASIS is a role-based access control architecture for achiev- ing secure interoperation rule associated with its activation becomes false. OASIS does not use role delegation but instead

  8. A Model of OASIS RoleBased Access Control and its Support for Active Security

    E-Print Network [OSTI]

    Cambridge, University of

    A Model of OASIS Role­Based Access Control and its Support for Active Security Walt Yao University.bacon@cl.cam.ac.uk ABSTRACT OASIS is a role-based access control architecture for achiev- ing secure interoperation rule associated with its activation becomes false. OASIS does not use role delegation but instead de#12

  9. IEC 61850 and IEC 62351 Cyber Security Acceleration Workshop

    SciTech Connect (OSTI)

    Clements, Samuel L.; Edgar, Thomas W.; Manz, David O.

    2012-04-01T23:59:59.000Z

    The purpose of this workshop was to identify and discuss concerns with the use and adoption of IEC 62351 security standard for IEC 61850 compliant control system products. The industry participants discussed performance, interoperability, adoption, challenges, business cases, and future issues.

  10. Digital Business Ecosystem Tools as Interoperability Mikls Herdon1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Digital Business Ecosystem Tools as Interoperability Drivers Miklós Herdon1 , Mária Raffai2 , Ádám of the Digital Business Ecosystem (DBE) has been come life in order to build an Internet-based environment in which businesses will be able to interact with each other more efficiently. In a Digital Ecosystem

  11. Compatibility and Interoperability Evaluation for All-digital Protection System

    E-Print Network [OSTI]

    -- compatibility, interoperability, IEC 61850, per- formance evaluation, process bus, protective relaying, relay of digital relays permit the development of an all-digital protection system. In such system, the output project titled, "Digital Protection System Using Optical Instrument Transformers and Digital Relays

  12. Models simulation and interoperability using MDA and HLA

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Models simulation and interoperability using MDA and HLA Hind El Haouzi CRAN (UMR 7039), University manufacturing environments. Our paper advocates for an approach combining MDA (model driven architecture interopérabilité dans le contexte de la simulation distribuée. Nos travaux visent ŕ combiner les architectures MDA

  13. Interoperability Mapping from XML Schemas to ER Diagrams

    E-Print Network [OSTI]

    Tronci, Enrico

    of a DBMS). In this paper, we introduce a technique called Xere (XML Entity Relationship Exchange) to assist. Key words: Data Models, Schema Evolution and Maintenance, Interoperability and Heterogeneity, Web, as the next step of its evolution, it is being adopted also for data description and manipulation

  14. Products information interoperability in manufacturing Tursi A.1,2

    E-Print Network [OSTI]

    Boyer, Edmond

    Products information interoperability in manufacturing systems Tursi A.1,2 , Dassisti M.1 , Panetto (France), herve.panetto@cran.uhp-nancy.fr. Abstract Information flows and products traceability a system able to trace all relevant information related to the product lifecycle. This information is quite

  15. Towards Interoperability of ISO Standards for Language Resource Management

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Interoperability of ISO Standards for Language Resource Management Kiyong Lee Korea.romary@loria.fr Abstract This paper reviews and evaluates some of the ISO documents for language resource management. Being developed under ISO/TC 37/SC 4, these documents are at the last stage of approval and publication as interna

  16. Interoperable Documentation Ted Habermann, NOAA/NESDIS/NGDC

    E-Print Network [OSTI]

    Interoperable Documentation Ted Habermann, NOAA/NESDIS/NGDC NCAR Earth Observing Laboratory, June.ngdc.noaa.gov/eds/tds/oceanSITESMetadataAssessment.html Spirals: https://www.nosc.noaa.gov/dmc/swg/wiki/index.php?title=Creating_Good_Documentation Questions Documentation Life Cycle: OAIS Mandatory Archive Responsibility: Ensure that the information to be preserved

  17. Architecture Concepts and Technical Issues for an Open, Interoperable Automated Demand Response Infrastructure

    E-Print Network [OSTI]

    Koch, Ed; Piette, Mary Ann

    2008-01-01T23:59:59.000Z

    energy efficiency and demand response in large facilities.was sponsored by the Demand Response Research Center whichInteroperable Automated Demand Response Infrastructure Ed

  18. Software Interoperability Problems and E-University Koblenz-Landau, Knowledge Media Institute,

    E-Print Network [OSTI]

    Boyer, Edmond

    Software Interoperability Problems and E- Learning Ingo Dahn University Koblenz-Landau, Knowledge Media Institute, Universitätsstr. 1, D-56070 Koblenz dahn@uni-koblenz.de Abstract Grid applications

  19. A PRODUCT ORIENTED MODELLING CONCEPT Holons for systems synchronisation and interoperability

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A PRODUCT ORIENTED MODELLING CONCEPT Holons for systems synchronisation and interoperability Salah by manufacturing information systems (informational view). This paper presents the "Holon" modelling concept the concept of holon can play a major role in ensuring interoperability in the enterprise context. 1

  20. A geosemantic proximity-based prototype for the interoperability of geospatial data

    E-Print Network [OSTI]

    A geosemantic proximity-based prototype for the interoperability of geospatial data Jean Brodeur a 2004 Abstract The research agenda related to the interoperability of geospatial data is influenced by the increased accessibility of geospatial databases on the Internet, as well as their sharing

  1. Using Space-Time Constraints to Guide Model Interoperability Paul F. Reynolds Jr.

    E-Print Network [OSTI]

    Brogan, David

    to motion retargeting ­ accurately transferring human motions to animated characters. A typical goalUsing Space-Time Constraints to Guide Model Interoperability Paul F. Reynolds Jr. Dept of Computer-924-1039 (V) , 434-982-2214 (F) reynolds@virginia.edu Keywords: Interoperability, Multi-Resolution Modeling

  2. A Survey on Approaches for Interoperability and Portability of Cloud Computing Services

    E-Print Network [OSTI]

    Petrakis, Euripides G.M.

    A Survey on Approaches for Interoperability and Portability of Cloud Computing Services Kostas.sotiriadis, petrakis}@intelligence.tuc.gr Keywords: Cloud computing, cloud interoperability, cloud portability Abstract: Over the recent years, the rapid development of Cloud Computing has driven to a large market of cloud

  3. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  4. OPSAID improvements and capabilities report.

    SciTech Connect (OSTI)

    Halbgewachs, Ronald D.; Chavez, Adrian R.

    2011-08-01T23:59:59.000Z

    Process Control System (PCS) and Industrial Control System (ICS) security is critical to our national security. But there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. Sandia National Laboratories has performed the research and development of the OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE), to address this issue. OPSAID is an open-source architecture for PCS/ICS security that provides a design basis for vendors to build add-on security devices for legacy systems, while providing a path forward for the development of inherently-secure PCS elements in the future. Using standardized hardware, a proof-of-concept prototype system was also developed. This report describes the improvements and capabilities that have been added to OPSAID since an initial report was released. Testing and validation of this architecture has been conducted in another project, Lemnos Interoperable Security Project, sponsored by DOE/OE and managed by the National Energy Technology Laboratory (NETL).

  5. Fred S. Roberts Command, Control, and Interoperability Center

    E-Print Network [OSTI]

    (CCICADA)* Rutgers University *A Department of Homeland Security University Center of Excellence The Trend ­ For patrons ­ For employees · HVAC · Communication systems ­ Electronic message boards ­ Public address

  6. Interoperability of Computer Aided Design and Energy Performance Simulation to Improve Building Energy Efficiency and Performance 

    E-Print Network [OSTI]

    Chaisuparasmikul, P.

    2006-01-01T23:59:59.000Z

    The paper describes very significant novel interoperability and data modeling technology for existing building that maps a building information parametric model with an energy simulation model, establishing a seamless link between Computer Aided...

  7. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  8. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  9. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid

    E-Print Network [OSTI]

    Lee, Eun Kyu

    2014-01-01T23:59:59.000Z

    energy curtailment of a service contract. The strategy mustenergy loads) of a service contract. The customer expectsCSP). That is, a service contract is made amongst three

  10. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid

    E-Print Network [OSTI]

    Lee, Eun Kyu

    2014-01-01T23:59:59.000Z

    C. Qiu, C. -C. Chu, and R. Gadh. Design of Fair ChargingQiu, C. -C. Chu, and R. Gadh. Design of Fast Response SmartK. Lee, R. Huang, P. Chu, R. Gadh, and M. Gerla. Enhancing

  11. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid

    E-Print Network [OSTI]

    Lee, Eun Kyu

    2014-01-01T23:59:59.000Z

    Energy Research Center (SMERC), who are always willing toand deployed by the UCLA SMERC research team. I thank Rui

  12. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid

    E-Print Network [OSTI]

    Lee, Eun Kyu

    2014-01-01T23:59:59.000Z

    twiki-sggrid/bin/view/SmartGrid/ SGIPSemanticModelSGAC. [4]periods [42]. http://www.iec.ch/smartgrid/standards/ http://

  13. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid

    E-Print Network [OSTI]

    Lee, Eun Kyu

    2014-01-01T23:59:59.000Z

    in more flexible ways as a “prosumer”. In the trading, realESI supports as a service prosumer. The other two examine

  14. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid

    E-Print Network [OSTI]

    Lee, Eun Kyu

    2014-01-01T23:59:59.000Z

    Microgrid operation with power generation, load, and energy storage. . . . .Microgrid operation with power generation, load, and energy storage.

  15. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid

    E-Print Network [OSTI]

    Lee, Eun Kyu

    2014-01-01T23:59:59.000Z

    Power generation [KW] on a solar panel in summer andpole, a desk lamp, or a solar panel at home. Challenge:Electric Vehicle (EV) and solar panel to smart light and

  16. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid

    E-Print Network [OSTI]

    Lee, Eun Kyu

    2014-01-01T23:59:59.000Z

    Loads for Demand Response within Buildings. In ACM BuildSys,Demand Response (ADR) service contract with the buildingbuilding owner participate in an automated demand response

  17. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  18. Interoperability constraints and requirements formal modelling and checking framework

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    an actor involved in a process (engineering, decision, control) focusing on complex system. These paradigms requirements having to be respected all along collaborative (private or public) processes. Keywords: System and stability (safety, security, etc.) and second, the process environment, resources and context. Various

  19. A systematic approach for managing the risk related to semantic interoperability between geospatial datacubes

    E-Print Network [OSTI]

    A systematic approach for managing the risk related to semantic interoperability between geospatial in Geospatial Databases for Decision-Support tarek.sboui.1@ulaval.ca, mehrdad.salehi.1@ulaval.ca, yvan.bedard@scg.ulaval.ca Abstract Geospatial datacubes are the database backend of novel types of spatiotemporal decision- support

  20. ip 2011Doctoral Spring Workshop Federative approach of interoperability at the design /

    E-Print Network [OSTI]

    Boyer, Edmond

    and semantic web tools. Key words : semantic interoperability, ontology, PLM, standards 1 Introduction During is a crucial key for maintening the constant progress required. The Product Lifecycle Management (PLM through all phases of a product's life cycle to everyone in an organization" [1]. A PLM approach requires

  1. A Semantic Annotation Framework to Assist the Knowledge Interoperability along a Product Life Cycle

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    in a product lifecycle management environment. Through the investigation of related works, the need and considered the Product Lifecycle Management (PLM) approach as one of essential solutions to createA Semantic Annotation Framework to Assist the Knowledge Interoperability along a Product Life Cycle

  2. Using Open Standards for Interoperability Issues, Solutions, and Challenges facing Cloud Computing

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Open Standards for Interoperability Issues, Solutions, and Challenges facing Cloud Computing, a new era of computing has been ushered in, that of grids and clouds. With several commercial cloud and commercial work loads within the ambit of cloud computing. Cloud computing has come as a blessing for small

  3. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  4. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  5. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  6. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  7. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  8. Common business objects: Demonstrating interoperability in the oil and gas industry

    SciTech Connect (OSTI)

    McLellan, S.G.; Abusalbi, N.; Brown, J.; Quinlivan, W.F. [Schlumberger, Austin, TX (United States). Product Center

    1997-10-01T23:59:59.000Z

    The PetroTechnical Open Software Corp. (POSC) was organized in 1990 to define technical methods to make it easier to design interoperable data solutions for oil and gas companies. When POSC rolls out seed implementations, oilfield service members must validate them, correct any errors or ambiguities, and champion these corrections into the original specifications before full integration into POSC-compliant, commercial products. Organizations like POSC are assuming a new role of promoting formation of projects where E and P companies and vendors jointly test their pieces of the migration puzzle on small subsets of the whole problem. The authors describe three such joint projects. While confirming the value of such open cross-company cooperation, these cases also help to redefine interoperability in terms of business objects that will be common across oilfield companies, their applications, access software, data, or data stores.

  9. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  10. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  14. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  15. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  16. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  17. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  20. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  1. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  2. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  3. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  4. NIST Smart Grid Framework Status Report This summary report provides a status update on the NIST smart grid interoperability framework. The

    E-Print Network [OSTI]

    NIST Smart Grid Framework Status Report This summary report provides a status update on the NIST smart grid interoperability framework. The NIST smart grid framework is a NIST special publication document (NIST SP1108, NIST Framework and Roadmap for Smart Grid Interoperability Standards, Releases 1, 2

  5. IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint

    SciTech Connect (OSTI)

    Basso, T.; DeBlasio, R.

    2012-04-01T23:59:59.000Z

    The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.

  6. Design and Implementation of an Open, Interoperable AutomatedDemand Response Infrastructure

    SciTech Connect (OSTI)

    Piette, Mary Ann; Kiliccote, Sila; Ghatikar, Girish

    2007-10-01T23:59:59.000Z

    This paper describes the concept for and lessons from the development and field-testing of an open, interoperable communications infrastructure to support automating demand response (DR). Automating DR allows greater levels of participation and improved reliability and repeatability of the demand response and customer facilities. Automated DR systems have been deployed for critical peak pricing and demand bidding and are being designed for real time pricing. The system is designed to generate, manage, and track DR signals between utilities and Independent System Operators (ISOs) to aggregators and end-use customers and their control systems.

  7. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  9. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  10. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  11. Semantic Interoperability in the Fixed Income Securities Industry: A Knowledge Representation Architecture for Dynamic Integration of Web-Based Information

    E-Print Network [OSTI]

    Moulton, Allen

    2003-02-10T23:59:59.000Z

    We examine a knowledge representation architecture to support context interchange mediation. For autonomous receivers and sources sharing a common subject domain, ...

  12. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  13. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  14. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  15. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  16. Development of high performance scientific components for interoperability of computing packages

    SciTech Connect (OSTI)

    Gulabani, Teena Pratap

    2008-12-01T23:59:59.000Z

    Three major high performance quantum chemistry computational packages, NWChem, GAMESS and MPQC have been developed by different research efforts following different design patterns. The goal is to achieve interoperability among these packages by overcoming the challenges caused by the different communication patterns and software design of each of these packages. A chemistry algorithm is hard to develop as well as being a time consuming process; integration of large quantum chemistry packages will allow resource sharing and thus avoid reinvention of the wheel. Creating connections between these incompatible packages is the major motivation of the proposed work. This interoperability is achieved by bringing the benefits of Component Based Software Engineering through a plug-and-play component framework called Common Component Architecture (CCA). In this thesis, I present a strategy and process used for interfacing two widely used and important computational chemistry methodologies: Quantum Mechanics and Molecular Mechanics. To show the feasibility of the proposed approach the Tuning and Analysis Utility (TAU) has been coupled with NWChem code and its CCA components. Results show that the overhead is negligible when compared to the ease and potential of organizing and coping with large-scale software applications.

  17. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  18. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  19. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  20. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  1. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  2. Building Interoperability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof Energy FutureDepartment of Energy Building Energy-EfficientBuilding

  3. Building Interoperability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof Energy FutureDepartment of Energy Building Energy-EfficientBuilding

  4. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  5. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  6. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  7. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  8. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  9. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  10. Design and Operation of an Open, Interoperable Automated Demand Response Infrastructure for Commercial Buildings

    SciTech Connect (OSTI)

    Piette, Mary Ann; Ghatikar, Girish; Kiliccote, Sila; Watson, David; Koch, Ed; Hennage, Dan

    2009-05-01T23:59:59.000Z

    This paper describes the concept for and lessons from the development and field-testing of an open, interoperable communications infrastructure to support automated demand response (auto-DR). Automating DR allows greater levels of participation, improved reliability, and repeatability of the DR in participating facilities. This paper also presents the technical and architectural issues associated with auto-DR and description of the demand response automation server (DRAS), the client/server architecture-based middle-ware used to automate the interactions between the utilities or any DR serving entity and their customers for DR programs. Use case diagrams are presented to show the role of the DRAS between utility/ISO and the clients at the facilities.

  11. Stereotactic Radiofrequency Ablation (SRFA) of Liver Lesions: Technique Effectiveness, Safety, and Interoperator Performance

    SciTech Connect (OSTI)

    Widmann, Gerlig, E-mail: gerlig.widmann@i-med.ac.at; Schullian, Peter, E-mail: peter.schullian@i-med.ac.at; Haidu, Marion, E-mail: marion.haidu@i-med.ac.at; Bale, Reto, E-mail: reto.bale@i-med.ac.at [Medical University of Innsbruck, Department of Radiology, SIP-Department of Microinvasive Therapy (Austria)

    2012-06-15T23:59:59.000Z

    Purpose: To evaluate technique effectiveness, safety, and interoperator performance of stereotactic radiofrequency ablation (SRFA) of liver lesions. Methods: Retrospective review including 90 consecutive patients from January 2008 to January 2010 with 106 computed tomography-guided SRFA sessions using both single and multiple electrodes for the treatment of 177 lesions: 72 hepatocellular carcinoma (HCC) and 105 metastases with a mean size of 2.9 cm (range 0.5-11 cm). Technique effectiveness and 1-year local recurrence were evaluated by computed tomographic scans. Complications, mortality, and hospital days were recorded. The performance between an experienced and inexperienced interventional radiologist was compared. Results: The overall technique effectiveness after a single SRFA was 95.5% (93.1% for HCC and 97.1% for metastases). Four of the eight unsuccessfully treated lesions could be retreated (secondary technique effectiveness of 97.7%). Local recurrence at 1 year was 2.9%. Technique effectiveness was significantly different for lesions <5 cm (96.7%) and >5 cm (87.5%) (P = 0.044) but not for lesions <3 cm (95.9%) and 3-5 cm (100%). Compared to clear parenchymal property (97.3%), vessel vicinity (93.3%) (P = 0.349) and subcapsular (95.2%) (P = 0.532) had no, but hollow viscera vicinity (83.3%) had a significantly lower technique effectiveness (P = 0.020). Mortality rate was 0.9%. Major complications and hospital days were higher for cirrhosis Child-Pugh B (20%, 7.2 days) than Child-Pugh A (3.1%, 4.7 days) patients and for metastases (5.1%, 4.3 days). There was no significant difference in interoperator performance. Conclusions: RFA allowed for efficient, reliable, and safe ablation of large-volume liver disease.

  12. Design and Operation of an Open, Interoperable Automated Demand Response Infrastructure for Commercial Buildings

    E-Print Network [OSTI]

    Piette, Mary Ann

    2010-01-01T23:59:59.000Z

    response, automation, commercial, industrial buildings, peakautomation system design. Auto-DR for commercial and industrialautomation server renamed as the DRAS. This server was operated at a secure industrial

  13. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  14. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  15. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  16. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  17. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  18. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  19. 3089Federal Register / Vol. 76, No. 12 / Wednesday, January 19, 2011 / Notices with sections 751(a)(1) and 777(i)(1) of

    E-Print Network [OSTI]

    such as the development and deployment of a Smart Grid, secure and interoperable electronic health records, cybersecurity, cloud computing, and interoperability in emergency communications depends upon interoperable standards

  20. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  1. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  2. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  3. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F.; Carroll, J.; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30T23:59:59.000Z

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  4. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  5. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  6. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  7. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  8. IEEE 1547 and 2030 Standards for Distributed Energy Resources Interconnection and Interoperability with the Electricity Grid

    SciTech Connect (OSTI)

    Basso, T.

    2014-12-01T23:59:59.000Z

    Public-private partnerships have been a mainstay of the U.S. Department of Energy and the National Renewable Energy Laboratory (DOE/NREL) approach to research and development. These partnerships also include technology development that enables grid modernization and distributed energy resources (DER) advancement, especially renewable energy systems integration with the grid. Through DOE/NREL and industry support of Institute of Electrical and Electronics Engineers (IEEE) standards development, the IEEE 1547 series of standards has helped shape the way utilities and other businesses have worked together to realize increasing amounts of DER interconnected with the distribution grid. And more recently, the IEEE 2030 series of standards is helping to further realize greater implementation of communications and information technologies that provide interoperability solutions for enhanced integration of DER and loads with the grid. For these standards development partnerships, for approximately $1 of federal funding, industry partnering has contributed $5. In this report, the status update is presented for the American National Standards IEEE 1547 and IEEE 2030 series of standards. A short synopsis of the history of the 1547 standards is first presented, then the current status and future direction of the ongoing standards development activities are discussed.

  9. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  10. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  11. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  12. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  13. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  14. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  15. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  16. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  17. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  18. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  19. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  20. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  1. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  2. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  3. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  4. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  5. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  6. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  7. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  8. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  9. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  10. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  11. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  12. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  13. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  14. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  15. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  16. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  17. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  18. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  19. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  20. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  1. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  2. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  3. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  4. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  5. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  6. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  7. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  8. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  9. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  10. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  11. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  12. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  13. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  14. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  15. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  16. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  17. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  18. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  19. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  20. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  1. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  2. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  3. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  4. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  5. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  6. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  7. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  8. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  9. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  10. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  11. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  12. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  13. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  14. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  15. Simulating human behavior for national security human interactions.

    SciTech Connect (OSTI)

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01T23:59:59.000Z

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  16. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  17. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  18. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  20. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  1. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  2. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  3. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  4. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  5. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  6. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  7. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  8. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  9. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  10. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  11. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  12. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  13. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  14. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  15. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  16. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  17. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  18. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  19. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  20. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  1. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  2. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  3. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  4. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  5. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  6. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  7. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  8. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  9. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  10. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  11. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  12. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  13. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  14. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  15. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  16. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  17. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  18. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  19. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  20. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  1. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  2. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  3. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  4. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  5. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  6. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  7. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  8. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  9. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  10. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  11. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  12. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  13. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  14. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  15. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  16. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  17. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  18. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  20. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  1. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  2. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  3. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  4. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  5. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  6. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  8. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  9. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  10. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  11. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  12. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  13. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  14. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  15. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  16. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  17. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprise’s

  18. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  19. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  20. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  1. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  2. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    limit economic development, impact interdependent infrastructure (such as energy and agriculture), and are a fundamental source of ... Climate Security On May 13, 2011, in...

  3. Pollux | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Pollux | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  4. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  5. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  6. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from improved climate models to performance models for underground waste storage to 3D printing and digital rock physics. Marianne Walck (Director ... Recent Sandia Secure,...

  7. Sandia National Laboratories: Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    States. I&C systems monitor the safe, reliable and secure generation and delivery of electricity and could have potential cyber vulnerabilities. At Sandia National Laboratories,...

  8. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  9. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  10. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  11. McMaster Security Services Annual Report 2009 1 Security Services

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services ­ Annual Report 2009 1 McMaster Security Services Annual Report 2009 #12;McMaster Security Services ­ Annual Report 2009 2 Mission Statement Developing a safe and secure to the Security Services Department. Methods and approaches to assist in achieving a safe and secure environment

  12. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  13. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAbout Us

  14. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1Resource forNational Cyber Security

  15. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8, 2000Consumption Survey (CBECS)Laboratory to HighlightSecurity Overview

  16. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuring

  17. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22, 2014SEC.

  18. Homeland Security Programs | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School football Highdefault Sign In About |PagesHomeland Security

  19. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  20. Annual Security Report October 1, 2013

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2013 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................4 MESSAGE FROM THE EINSTEIN SECURITY DEPARTMENT

  1. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  2. A Survey on Cloud Provider Security

    E-Print Network [OSTI]

    A Survey on Cloud Provider Security Measures Alex Pucher, Stratos Dimopoulos Abstract Cloud take advantage of this model already, but security and privacy concerns limit the further adoption agencies and start offering security certifications and separate tightly controlled "government" cloud

  3. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses (not Reactors appropriations including the National Nuclear Security Administration field offices. This account

  4. Annual Security Report October 1, 2012

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2012 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................3 MESSAGE FROM THE SECURITY DEPARTMENT

  5. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses, and Naval Reactors appropriations including the National Nuclear Security Administration (NNSA) field of

  6. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision technology needs of the University. The Information Technology Security Office has created this Incident, affiliates, or students. Audience This document is primarily for University departmental information security

  7. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    June 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute the security of their information tech nology (IT) systems. Whether they get this assistance from internal

  8. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Computer Security Division Information Technology Laboratory National Institute of Standards

  9. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  10. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  11. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  13. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  14. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  15. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07T23:59:59.000Z

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  16. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  17. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  18. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03T23:59:59.000Z

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  19. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Energy Savers [EERE]

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  20. Harold Washington Social Security Administration (SSA) Center...

    Office of Environmental Management (EM)

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  1. Climate VISION: Security and Privacy Notices

    Office of Scientific and Technical Information (OSTI)

    SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs...

  2. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04T23:59:59.000Z

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  3. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  4. Enforcement Letter, Consolidated Nuclear Security, LLC | Department...

    Energy Savers [EERE]

    security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

  5. Independent Oversight Evaluation, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

  6. Independent Oversight Inspection, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

  7. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

  8. Quantum Enabled Security (QES) for Optical Communications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Los Alamos National Laboratory has developed Quantum Enabled...

  9. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

  10. Safety and Security Enforcement Process Overview

    Broader source: Energy.gov (indexed) [DOE]

    SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

  11. Developing Secure Power Systems Professional Competence: Alignment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems...

  12. Independent Oversight Activity Report, Nevada National Security...

    Office of Environmental Management (EM)

    Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

  13. Independent Activity Report, Nevada National Security Site -...

    Energy Savers [EERE]

    Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR NNSS-2012-12-03 This Independent Activity Report documents an...

  14. CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS

    E-Print Network [OSTI]

    Olsen, Stephen L.

    Security service is currently handled through a private security guard service contract, which provides

  15. Buildings Interoperability Landscape ? DRAFT

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Heating, Refrigerating, and Air-Conditioning Engineers BACS building automation and control system BCHP building-cooling-heating-power BPM Business Process Modeling BTO...

  16. CHICAGO REGION'S INTEROPERABLE

    E-Print Network [OSTI]

    Minnesota, University of

    · Program Management Plan (PMP) · Systems Engineering Management Plan (SEMP) · Concept of Operations (ConOps

  17. Rethinking Anticircumvention's Interoperability Policy

    E-Print Network [OSTI]

    Perzanowski, Aaron K.

    2008-01-01T23:59:59.000Z

    10NES, is a fair use. ”); Sony Computer Entertainment, Inc.3). 75 Id. § 1201(a)(1)(B). 76 Sony continued its litigationon other theories. See Sony Comp. Entm’t Inc. v. Connectix

  18. Buildings Interoperability Proceedings

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof Energy FutureDepartment of EnergyRolandBuilding theAugust 2015Vision

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  20. Multipartite secure state distribution

    SciTech Connect (OSTI)

    Duer, W.; Briegel, H.-J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria); Institut fuer Quantenoptik und Quanteninformation der Oesterreichischen, Akademie der Wissenschaften, Innsbruck (Austria); Calsamiglia, J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria)

    2005-04-01T23:59:59.000Z

    We introduce the distribution of a secret multipartite entangled state in a real-world scenario as a quantum primitive. We show that in the presence of noisy quantum channels (and noisy control operations), any state chosen from the set of two-colorable graph states (Calderbank-Shor-Steane codewords) can be created with high fidelity while it remains unknown to all parties. This is accomplished by either blind multipartite entanglement purification, which we introduce in this paper, or by multipartite entanglement purification of enlarged states, which offers advantages over an alternative scheme based on standard channel purification and teleportation. The parties are thus provided with a secret resource of their choice for distributed secure applications.

  1. McMASTER SECURITY SERVICES ANNUAL REPORT 2007

    E-Print Network [OSTI]

    Thompson, Michael

    McMASTER SECURITY SERVICES ANNUAL REPORT 2007 #12;#12;Table of Contents MCMASTER SECURITY SERVICES .................................................................................................................................6 MCMASTER SECURITY SERVICES ­ WHO WE .......................................................................................................................29 #12;#12;5 MCMASTER SECURITY SERVICES MISSION STATEMENT Developing a safe and secure environment

  2. Software Security Rules, SDLC Perspective

    E-Print Network [OSTI]

    Banerjee, C

    2009-01-01T23:59:59.000Z

    Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are el...

  3. WEP SecurityWEP Security David ArmstrongDavid Armstrong

    E-Print Network [OSTI]

    ""inin house.house."" 802.11802.11 nn 802.11a802.11a ­­ no securityno security nn 802.11b802.11b ­­ WEP

  4. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  5. The Secure Hash Payment System

    E-Print Network [OSTI]

    Thompson, Timothy J

    2001-01-01T23:59:59.000Z

    OF FIGURES FIGURE Page 1 SET overview 32 2 SET messages 34 3 SET and SSL overview 36 4 Overview of SHPS 48 5 An example E C M L document 56 6 An example E C C document 57 7 An example CurrencyUpdate document 65 8 An example PurchaseRequest document... information. Netscape's Secure Socket Layer (SSL) provides the secure link between the consumer and merchant. While this approach has been successful due to the availability of SSL in most web browsers, the approach does not provide the level of security...

  6. Entropic security in Quantum Cryptography

    E-Print Network [OSTI]

    Simon Pierre Desrosiers

    2007-11-16T23:59:59.000Z

    We present two new definitions of security for quantum ciphers which are inspired by the definition of entropic security and entropic indistinguishability defined by Dodis and Smith. We prove the equivalence of these two new definitions. We also propose a generalization of a cipher described by Dodis and Smith and show that it can actually encrypt n qubits using less than n bits of key under reasonable conditions and yet be secure in an information theoretic setting. This cipher also totally closes the gap between the key requirement of quantum ciphers and classical ciphers.

  7. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group The principles · The eight principles are: 1. Economy of mechanism 2. FailIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group Objectives

  8. Decision Support for Choice of Security

    E-Print Network [OSTI]

    Langseth, Helge

    Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o¤ analysis and trade-o¤ tool BBN topology. (6) Rule set for how

  9. Security Event and Log Management Service

    E-Print Network [OSTI]

    Security Event and Log Management Service: Comprehensive, Cost-effective Approach to Enhance Network Security and Security Data Management IBM Global Technology Services December 2007 #12;Executive Summary The economics of network security have changed. The high cost and complexity inherent in the use

  10. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act of 2002 3 Security Management and Assistance Group (SMA) 4 FISMA Implementation Project 4 Publications

  11. McMaster Security 2012 Annual Report

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services 2012 Annual Report #12;McMaster Security Services ­ Annual Report 2012 2 Mission Statement Developing a safe and secure environment in this academic institution within the McMaster community is assigned to the Security Services Department. Methods and approaches

  12. Server Security Policy 1.0 Purpose

    E-Print Network [OSTI]

    Demirel, Melik C.

    Server Security Policy COE­SSP­01 1.0 Purpose The purpose of this policy is to establish standards configurations must be in accordance with approved College guidelines to ensure a significant level of security Wrappers or other security mechanisms. · The most recent security patches must be installed on the system

  13. Feb 4, 2005 --Lecture 8 Computer Security

    E-Print Network [OSTI]

    Jones, Douglas W.

    Feb 4, 2005 -- Lecture 8 22C:169 Computer Security Douglas W. Jones Department of Computer Science Program Security #12;Is this program secure? A simple question only if program has no input or output in program Failure Manifestation of fault in behavior Relative to spec assumed correct! #12;Security

  14. April 8, 2005 --Lecture 30 Computer Security

    E-Print Network [OSTI]

    Jones, Douglas W.

    April 8, 2005 -- Lecture 30 22C:169 Computer Security Douglas W. Jones Department of Computer Science Administrative Issues #12;Warning Security is a system property An emergent property of the whole of system Security rarely emerges by accident Adding a security module to a system rarely achieves much! #12

  15. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  16. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  17. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  18. COMPUTER SECURITY EDUCATION Past, Present and Future

    E-Print Network [OSTI]

    information. Computer security researchers and practitioners were few in number, worked primarilyCOMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden: This paper presents an overview of computer security education in academia. We examine security education

  19. Grid Security: Expecting the Mingchao Ma

    E-Print Network [OSTI]

    University College London

    of a communications line; Power failure; Internet connection failure; Mis-configuration; · Security incidents ­ SystemGrid Security: Expecting the Unexpected Mingchao Ma STFC ­ Rutherford Appleton Laboratory, UK #12;Slide 2 Overview · Security Service Challenges (SSC) Review · Grid Security Incident ­ What had happened

  20. EXTENDED DESCRIPTION TECHNIQUES FOR SECURITY ENGINEERING

    E-Print Network [OSTI]

    of security critical systems. Based on general security evaluation criteria, we show how to extend the system applications that communi- cate over open networks like the Internet--security is an extremely important issue this problem, on the one hand there are highly sophisticated col- lections of evaluation criteria that security

  1. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

  2. Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?

    E-Print Network [OSTI]

    Qin, Xiao

    Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

  3. Utility Security & Resiliency: Working Together

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—discusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

  4. INL@Work Cyber Security

    SciTech Connect (OSTI)

    Chaffin, May

    2010-01-01T23:59:59.000Z

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  5. Master Safeguards and Security Agreements

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03T23:59:59.000Z

    To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

  6. Meeting Federal Energy Security Requirements

    Broader source: Energy.gov [DOE]

    Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

  7. Energy and Global Security - Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Team Helps Lead Charge to Revolutionize Energy Storage Gizmodo UK: Fast-Acting Nuclear Reactor Will Power through Piles of Plutonium Daily Herald: Fagel Book Named Security Book of...

  8. NSC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home content Social Media NSC NSC What does NNSA's new National Security Campus in Kansas City, MO look...

  9. Forrestal Security and Safety Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1983-02-02T23:59:59.000Z

    To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

  10. Security Area Vouching and Piggybacking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-05T23:59:59.000Z

    Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

  11. Cognitive Security for Personal Devices

    E-Print Network [OSTI]

    Greenstadt, Rachel

    2008-03-17T23:59:59.000Z

    Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

  12. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30T23:59:59.000Z

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  13. Secure Biometric Recognition Abhishek Nagar

    E-Print Network [OSTI]

    Template Security 20 3.1 Biometric Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3.6 Evaluation of Template Protection Techniques . . . . . . . . . . . . . . . . . 41 4 of the major threats hovering the wired society. According to Javelin Strategy and Research Survey, there were

  14. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01T23:59:59.000Z

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  15. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

  16. Homeland Security Issues for Facilities

    E-Print Network [OSTI]

    McClure, J. D.; Fisher, D.; Fenter, T.

    2004-01-01T23:59:59.000Z

    more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure...

  17. Securities trading of concepts (STOC)

    E-Print Network [OSTI]

    Dahan, Ely

    Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a “securities trading ...

  18. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division National Institute of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M

  19. Security of counterfactual quantum cryptography

    SciTech Connect (OSTI)

    Yin Zhenqiang; Li Hongwei; Chen Wei; Han Zhengfu; Guo Guangcan [Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026 (China)

    2010-10-15T23:59:59.000Z

    Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.

  20. INL@Work Cyber Security

    ScienceCinema (OSTI)

    Chaffin, May

    2013-05-28T23:59:59.000Z

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  1. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  2. Office of Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  3. Critical Infrastructure and Cyber Security

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01T23:59:59.000Z

    that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

  4. Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

  5. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01T23:59:59.000Z

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  6. all-weather security surveillance: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  7. asia-pacific security studies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  8. Sandia Energy - The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Center for SCADA Security Assets Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure...

  9. NNSA Celebrates 10 Years of Cooperation with Russia in Securing...

    National Nuclear Security Administration (NNSA)

    Security Administration (NNSA) commemorated ten years of work securing nuclear and radiological material in Russia and the former Soviet Union by completing security...

  10. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS...

  11. Information Aggregation, Currency Swaps, and the Design of Derivative Securities

    E-Print Network [OSTI]

    Chowdhry, Bhagwan; Grinblatt, Mark

    1997-01-01T23:59:59.000Z

    their disparate information and (ii) each security should befor these securities and the information it generates.all information relevant for pricing securities to all

  12. Information Security Policy Manual Latest Revision: May 16, 2012

    E-Print Network [OSTI]

    Alpay, S. Pamir

    1 Information Security Policy Manual Latest Revision: May 16, 2012 #12;2 Table of Contents Information Security Policy Manual...............................................................................................................................................17 Information Security Glossary

  13. assa security center: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cures All Dumb Ideas in Computer Security 919 Jul 2011 12 147 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

  14. Secretary Moniz Hosts Energy Security Symposium, Honors Dr. Daniel...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hosts Energy Security Symposium, Honors Dr. Daniel Yergin with First James R. Schlesinger Medal for Energy Security Secretary Moniz Hosts Energy Security Symposium, Honors Dr....

  15. 2014 Headquarters Facilities Master Security Plan - Chapter 11...

    Office of Environmental Management (EM)

    1, Incidents of Security Concern 2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern October 2014 2014 Headquarters Facilities Master...

  16. 2014 Headquarters Facilities Master Security Plan - Chapter 17...

    Office of Environmental Management (EM)

    7, Headquarters Security Officer Program 2014 Headquarters Facilities Master Security Plan - Chapter 17, Headquarters Security Officer Program June 2014 2014 Headquarters...

  17. DOE Undersecretary for Nuclear Security and NNSA Administrator...

    National Nuclear Security Administration (NNSA)

    Undersecretary for Nuclear Security and NNSA Administrator Frank Klotz visits Y-12 National Security Complex | National Nuclear Security Administration Facebook Twitter Youtube...

  18. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  19. Integrated safeguards and security management plan

    SciTech Connect (OSTI)

    Bowen, Sue, editor

    2001-04-16T23:59:59.000Z

    Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

  20. Status of the National Security Workforce

    SciTech Connect (OSTI)

    None

    2008-03-31T23:59:59.000Z

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  1. Security and Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnderSecurity and

  2. Homeland Security and Defense Applications

    SciTech Connect (OSTI)

    None

    2014-11-06T23:59:59.000Z

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  3. Tighter security for electronic information

    SciTech Connect (OSTI)

    Moore, T.

    1996-11-01T23:59:59.000Z

    Responding to interest expressed by many member utilities, EPRI is launching strategic core research in information security to help companies better protect power system operations, business-sensitive and private customer data, and networks from unauthorized access or use. Although the threat of computer security breaches has been relatively low and isolated in the past and break-ins have been few, the increasing use of networks for various business activities suggests that such risks will rise. EPRI expects to work through an existing strategic alliance with the Department of Energy to tap the expertise of the national laboratories in beefing up utilities` information security systems and practices. This paper describes these potential threats and strategies to combat them.

  4. Homeland Security and Defense Applications

    ScienceCinema (OSTI)

    None

    2015-01-09T23:59:59.000Z

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  5. Security-by-design handbook.

    SciTech Connect (OSTI)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01T23:59:59.000Z

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  6. Climate Change and National Security

    SciTech Connect (OSTI)

    Malone, Elizabeth L.

    2013-02-01T23:59:59.000Z

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  7. Mission | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintaining theSan Jose-San| National Nuclear Security

  8. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANs usingSecuring

  9. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANs usingSecuringMarch

  10. Security and Privacy Notices | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecuritySecurity

  11. Purdue Homeland Security J. Eric Dietz, PhD, PE

    E-Print Network [OSTI]

    Ginzel, Matthew

    · Establishing a Homeland Security career development pipeline · Developing business security processes ­ Class project developing principles for managing large event security applications ­ Lectures ­ Class project with Purdue Federal Credit Union and Verizon ­ Business Continuity and security · Homeland

  12. Electronic DOE Information Security System (eDISS) PIA, Office...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

  13. Secure Pairing of Constrained Wireless Devices: Challenges and Pitfalls

    E-Print Network [OSTI]

    Carver, Jeffrey C.

    and Privacy in Emerging Systems (SPIES) lab. He works in the broad areas of computer and network security.S. Program in Cyber-Security. Saxena is serving as an Associate Editor for flagship security journals, IEEE

  14. A Declarative Framework for Security: Secure Concurrent Constraint Programming

    E-Print Network [OSTI]

    Valencia, Frank D.

    Javeriana Cali {halopez,japerez,crueda}@cic.puj.edu.co 2 INRIA and LIX École Polytechnique catuscia in the analysis of security protocols and one promising approach is the development of formalisms that model and implementations for CCP have been developed: E.g., denotational models [SRP91], specification logics and proof

  15. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

  16. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect (OSTI)

    Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

    1996-06-20T23:59:59.000Z

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  17. Systems thinking for safety and security

    E-Print Network [OSTI]

    Young, William Edward

    The fundamental challenge facing security professionals is preventing losses, be they operational, financial or mission losses. As a result, one could argue that security professionals share this challenge with safety ...

  18. Geopolitics and Energy Security in South America 

    E-Print Network [OSTI]

    Flaceliere, Aurore

    This dissertation looks at the energy security situation in South America and tries to evaluate why, even though the region possesses important resources, it finds itself today in a rather precarious situation regarding the future. Energy security...

  19. Improving tamper detection for hazardous waste security

    SciTech Connect (OSTI)

    Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Martinez, R. K. (Ronald K.); Martinez, D. D. (Debbie D.); Lopez, L. N. (Leon N.)

    2002-01-01T23:59:59.000Z

    After September 11, waste managers are increasingly expected to provide improved levels of security for the hazardous materials in their charge. Many low-level wastes that previously had minimal or no security must now be well protected, while high-level wastes require even greater levels of security than previously employed. This demand for improved security comes, in many cases, without waste managers being provided the necessary additional funding, personnel, or security expertise. Contributing to the problem is the fact that--at least in our experience--waste managers often fail to appreciate certain types of security vulnerabilities. They frequently overlook or underestimate the security risks associated with disgruntled or compromised insiders, or the potential legal and political liabilities associated with nonexistent or ineffective security. Also frequently overlooked are potential threats from waste management critics who could resort to sabotage, vandalism, or civil disobedience for purposes of discrediting a waste management program.

  20. Statistical analysis of correlated fossil fuel securities

    E-Print Network [OSTI]

    Li, Derek Z

    2011-01-01T23:59:59.000Z

    Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

  1. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  2. Privacy & Security Notice | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy...

  3. An Operations Research approach to aviation security

    E-Print Network [OSTI]

    Martonosi, Susan Elizabeth

    2005-01-01T23:59:59.000Z

    Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

  4. Safeguards and Security Program, acronyms and abbereviations...

    Office of Environmental Management (EM)

    Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 August 26, 2005 Canceled Safeguards and Security...

  5. Site Tour Security Plan.pdf

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for Site Tours Regarding Request for Proposal No. DE-SOL-0001458 Page 1 of 6 SECURITY PLAN The Pantex Plant (Pantex), Y-12 National Security Complex (Y-12), and the Tritium...

  6. Security and Access Policy Security of and access to campus facilities, including campus residences

    E-Print Network [OSTI]

    Escher, Christine

    Security and Access Policy Security of and access to campus facilities, including campus residences facilities. Residence halls are secured 24 hours a day. Over extended breaks, the doors of all residence halls will be secured around the clock. Some facilities may have individual hours, which may vary

  7. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    COSC 472 Network Security Annie Lu 1 COSC 472 Network Security · Instructor: Dr. Enyue (Annie) Lu Network Security Annie Lu 2 Course overview · Chapter 1: Introduction · Part I: Cryptography · Chapter 2 · Part II ­III: Network Security · Chapter 4: key Distribution & User Authentication · Chapter 5: Network

  8. National Security Issues at Department of Homeland Security and Department of Wednesday, November 18th

    E-Print Network [OSTI]

    Farritor, Shane

    Seminar: National Security Issues at Department of Homeland Security and Department of Energy Transformational & Applied Research Directorate U.S. Department of Homeland Security Domestic Nuclear Detection Directorate at the Department of Homeland Security's Domestic Nuclear Detection Office. In this role, he

  9. When security meets software engineering: A case of modelling secure information systems

    E-Print Network [OSTI]

    When security meets software engineering: A case of modelling secure information systems Engineering: towards the Modeling of Secure Information Systems" paper presented at the 15th International. This is mainly because private information is stored in computer systems and without security, organisations (and

  10. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems

    E-Print Network [OSTI]

    Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems for information systems. Traditionally, security is considered after the definition of the system. However the health sector to military. As the use of Information Systems arises, the demand to secure those systems

  11. Securing Wireless Sensor Networks: Introducing ASLAN -A Secure Lightweight Architecture for WSNs

    E-Print Network [OSTI]

    Dobson, Simon

    Securing Wireless Sensor Networks: Introducing ASLAN - A Secure Lightweight Architecture for WSNs://www.comp.dit.ie/mcollins 2 http://www.csi.ucd.ie/Staff/AcademicStaff/{sdobson, pnixon} Abstract Wireless sensor networks. To address the security vulnerabilities in a wireless sensor network, this paper proposes a secure

  12. The role of a security strategy is to align company security and business goals, provide

    E-Print Network [OSTI]

    Fisher, Kathleen

    , and methodologies to assist you in building a complete unified information security program or individual elements's information security program meets its requirements across the board, it is vital to have one enterprise security strategy and one information security framework. Putting in a solid foundational program

  13. Extreme Security Engineering: On Employing XP Practices to Achieve "Good Enough Security"

    E-Print Network [OSTI]

    Extreme Security Engineering: On Employing XP Practices to Achieve "Good Enough Security" without Main Mall, Vancouver, BC Canada V6T 1Z4 beznosov@ece.ubc.ca ABSTRACT This paper examines practices of eXtreme Security Engineering (XSE), an application of XP practices to security engineering, and discuss its

  14. Secure Pesticide Storage: Security and Safety-promoting Features of Pesticide Storage Facilities1

    E-Print Network [OSTI]

    Watson, Craig A.

    PI32 Secure Pesticide Storage: Security and Safety-promoting Features of Pesticide Storage pesticide storage facility security and safety. Introduction In actual practice, the fundamental goal of "security" is always the same: effective safeguard. Therefore, certain features of a pesticide storage

  15. Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using a Graphical

    E-Print Network [OSTI]

    California at Davis, University of

    Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using of California, Davis {hoagland,pandey,levitt}@cs.ucdavis.edu Technical Report CSE-98-3 A security policy states for organizations to declare their security policies, even informal state- ments would be better than the current

  16. NISTIR 6462 CSPP -Guidance for COTS Security Protection Profiles

    E-Print Network [OSTI]

    ..................................................................................................................................................4 2.2 OPERATIONAL ENVIRONMENT ............................................................................................................................... 25 4.3 JOINT TOE/ENVIRONMENT SECURITY OBJECTIVES...................................................................................................................5 3. SECURITY ENVIRONMENT

  17. NNSA Selects Consolidated Nuclear Security, LLC to Manage the...

    National Nuclear Security Administration (NNSA)

    Consolidated Nuclear Security, LLC to Manage the Consolidated Contract for Nuclear Production Operations | National Nuclear Security Administration Facebook Twitter Youtube...

  18. The Department of Energy's National Security Information Fundamental...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Department of Energy's National Security Information Fundamental Classification Guidance Review The Department of Energy's National Security Information Fundamental...

  19. 2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13...

    Energy Savers [EERE]

    HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION 2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED...

  20. Summit on Education in Secure Software Final Report

    E-Print Network [OSTI]

    Burley, Diana L.; Bishop, Matt

    2011-01-01T23:59:59.000Z

    development life cycle (SDLC) and secure design patterns.development life cycle (SDLC), and secure design patterns.

  1. Nuclear / Radiological Advisory Team | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Radiological Advisory Team | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering...

  2. Federal Register Notice: National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNLNM) Federal Register Notice: National Nuclear Security Administration...

  3. Unconditional security at a low cost

    E-Print Network [OSTI]

    Xiongfeng Ma

    2006-07-31T23:59:59.000Z

    By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\\"{u}tkenhaus, and unconditional security analysis by Gottesman-Lo-L\\"{u}tkenhaus-Preskill. Our results show that these two schemes yield close performances. Since the Holy Grail of QKD is its unconditional security, we conclude that one is better off considering unconditional security, rather than restricting to individual attacks.

  4. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    J. [2004], Low-latency cryptographic protection for SCADAlatency high-integrity security retrofit for lecacy SCADA

  5. Track 6: Integrating Safety Into Security Operations

    Broader source: Energy.gov [DOE]

    ISM Workshop Presentations Knoxville Convention Center, Knoxville, TN August 2009 Track 6: Integrating Safety Into Security Operations

  6. Safety and Security Enforcement Coordinator Handbook

    Broader source: Energy.gov (indexed) [DOE]

    Reporting Criteria (Tables III-3 & III-4) ...9 * Classified Information Security Noncompliance Reporting Criteria (Table III- 5) ...12 *...

  7. National Securities Technologies _NSTec_ Livermore Operations...

    Broader source: Energy.gov (indexed) [DOE]

    NAICS North American Industry Classification System NIF National Ignition Facility NNSA National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory...

  8. New Solicitations | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Stewardship Science Academic Alliances New Solicitations New Solicitations The National Nuclear Security Administration's Office of Research, Development, Test, and Evaluation...

  9. Preproposal Conference & Site Tour | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Preproposal Conference & Site Tour | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

  10. Energy Security: Microgrid Planning and Design (Presentation)

    SciTech Connect (OSTI)

    Giraldez, J.

    2012-05-01T23:59:59.000Z

    Energy Security: Microgrid Planning and Design presentation to be given at the 2012 WREF in Denver, CO.

  11. Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy Officers Divisional Information Security-Privacy Liaison Departmental Information Security-Privacy Liaison Planning Plan and conduct annual risk assessment Develop a prioritized

  12. Human Resources Security Access Matrix Function Training

    E-Print Network [OSTI]

    Wu, Shin-Tson

    June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

  13. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04T23:59:59.000Z

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

  14. Third Annual Cyber Security and Information

    E-Print Network [OSTI]

    Krings, Axel W.

    Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

  15. Business-driven security White paper

    E-Print Network [OSTI]

    March 2008 Business-driven security White paper Take a holistic approach to business-driven security. #12;Take a holistic approach to business-driven security. 2 Overview Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates

  16. Campus Security 1951 East-West Road

    E-Print Network [OSTI]

    Campus Security 1951 East-West Road Honolulu, Hawai`i 96822 Telephone: (808) 956-9293 Fax: (808 First Female Campus Security Captain Alberta J.K. Pukahi Brings Unique Perspectives to the Position (HONOLULU, HI, December 10, 2012) University of Hawai`i at Mnoa's Campus Security and Emergency Management

  17. Security Policies as the Foundation for Cryptographic

    E-Print Network [OSTI]

    Security Policies as the Foundation for Cryptographic Key Management Elaine Barker, CKMS Project to Layered Security Policies ­ From Information Management to Key Mngt. ­ From Dept. of Com. To NIST Employees · Security Domains ­ Simple to Complex · Key Management ­ Static to Configurable to Dynamic

  18. Food Security in the Western US

    E-Print Network [OSTI]

    Food Security in the Western US and Pacific Territories 23 Rural Connections Nov. 2009 By PeteR BaRcinas ADAP is tackling the food security implications of climate change, rising sea levels, and fuel costs Pacific (aDaP) Regional Food security and Sufficiency Project brings together community, local, state

  19. Security in 3rd Generation Mobile Networks

    E-Print Network [OSTI]

    Stavrakakis, Ioannis

    Security in 3rd Generation Mobile Networks Christos Xenakis and Lazaros Merakos Communication In the last few years, we have witnessed an explosion in demand for security measures motivated stakeholders are interested in the security level supported in the new emerging mobile environment. This paper

  20. Cyber Security Grand Challenges and Prognosis

    E-Print Network [OSTI]

    Sandhu, Ravi

    Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Institute for Cyber Security Executive Director and Endowed Chair ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu © Ravi Sandhu World-Leading Research with Real Cyber Security Grand Challenges and Prognosis Prof. Ravi

  1. SOCIAL SECURITY NUMBER AND NAME VERIFICATION

    E-Print Network [OSTI]

    Amin, S. Massoud

    SOCIAL SECURITY NUMBER AND NAME VERIFICATION Academic Year 2014­2015 *FA552-A* Please recycle. DIRECTIONS--You must verify your name and Social Security number for processing of your 2014­2015 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your Social Security

  2. Campus Security Camera Issued: April 2009

    E-Print Network [OSTI]

    Campus Security Camera Policy Issued: April 2009 Revised: November 2009 Responsible Administrative locations on the Colorado School of Mines campus. CCTV cameras, also known as security cameras, are utilized as one tool to help enhance the security of the campus community and real property. As the campus

  3. SOCIAL SECURITY NUMBER AND NAME VERIFICATION

    E-Print Network [OSTI]

    Amin, S. Massoud

    SOCIAL SECURITY NUMBER AND NAME VERIFICATION Academic Year 2013­2014 *FA552-A* Please recycle. DIRECTIONS--You must verify your name and Social Security number for processing of your 2013­2014 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your Social Security

  4. What Programmers Should Know About Security

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    What Programmers Should Know About Security University of Rochester Matthew Dalton, CISSP #12;Goals Brief Overview of Programming Practices Major Pitfalls in Secure Programming Examples (if are taken from "Building Secure Software" by John Viega & Gary McGraw. I would suggest buying it if you

  5. Systems Security at Chemical and Biochemical Engineering

    E-Print Network [OSTI]

    and Biochemical Engineering. The Systems Administrator for Chemical and Biochemical Engineering regularly reviews network security.However, maintaining systems security is a group effort and a never-ending task. Here Administrator regarding security bugs that may affect your personal computer. If a patch is available, download

  6. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net May 2007 #12 The Emerging Threat Landscape . . . . . . . . . . . . . . . . . . . . . . . . 2 Mobile Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly May

  7. Department of Energy Cyber Security Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-21T23:59:59.000Z

    The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

  8. Cyber Security in Smart Grid Substations

    E-Print Network [OSTI]

    Utrecht, Universiteit

    Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

  9. Start your information security planning here!

    E-Print Network [OSTI]

    Magee, Joseph W.

    Start your information security planning here! Save the Date July 15, 2008 8:30 am ­ 12:30 pm-technology crimes. For additional information, visit http://csrc.nist.gov/secure iz/b or contact: securebiz developed a workshop to help the small business owner increase information system security. Learn how

  10. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision requirements for the protection of that information on the University. The University has had security of the University. The Information Technology Security Office has created this Incident Response Plan to assist

  11. Information Security 26:198:643:01

    E-Print Network [OSTI]

    Lin, Xiaodong

    Information Security 26:198:643:01 Spring 2012 Rutgers University M 2:30-5:20pm, 1WP-534 Panagiotis and interconnecting networks, raising demands for security measures to protect the information and relevant systems, students will learn the theoretical advancements in information security, state-of-the- art techniques

  12. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, As we write the summer issue, with the hire of Indir Advagic, SEAS is launching an Office of Information Security. Besides assessing the general state of information security at SEAS, one of Indir's first tasks will be to revive the cross

  13. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Pedersen, Tom

    Privacy and Security Protecting Personal Information Kim Hart and Bill Trott #12;Privacy Video http and security and apply the principles to your work situation; · Overview of Freedom of Information records with confidential and highly confidential information; · Faculty and staff may have privacy/security

  14. Information Technology Security for Small Business

    E-Print Network [OSTI]

    Magee, Joseph W.

    Information Technology Security for Small Business (video script) Descriptive Text for the Visually symbolic of information technology security and cyber crime. Narration: "No matter how well you protect, "Information Technology Security for Small Business" and "It's not just good business. It's essential business

  15. Secured Information Flow for Asynchronous Sequential Processes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Secured Information Flow for Asynchronous Sequential Processes Isabelle Attali, Denis Caromel for unauthorized information flows. As a final result, all authorized communication paths are secure: no disclosure a new issue in data confidentiality: authorization of secured information flow transiting (by the mean

  16. Formalizing Information Security Knowledge Stefan Fenz

    E-Print Network [OSTI]

    Formalizing Information Security Knowledge Stefan Fenz Vienna University of Technology Vienna ontology which provides an on- tological structure for information security domain knowl- edge. Besides of the considered organization is incorporated. An evaluation conducted by an information security expert team has

  17. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    of cryptography as it relates to the computer security industry. We will look at some of the underlying technologyIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly

  18. A Software Engineering Perspective for Services Security

    E-Print Network [OSTI]

    Han, Jun

    A Software Engineering Perspective for Services Security Jun Han School of Information Technology. We have seen much work in the traditional area of information and network security, focusing such as encryption algo- rithms and key exchange protocols has been the main topic of the information security

  19. MARGIN AND SENSITIVITY METHODS SECURITY ANALYSIS

    E-Print Network [OSTI]

    MARGIN AND SENSITIVITY METHODS FOR SECURITY ANALYSIS OF ELECTRIC POWER SYSTEMS by Scott Greene the amount by which system loads or power transfers can change before a security violation, such as an overloaded transmission line, is encountered. This thesis shows how to efficiently compute security margins

  20. Cloud Security: Issues and Concerns Pierangela Samarati*

    E-Print Network [OSTI]

    Samarati, Pierangela

    1 Cloud Security: Issues and Concerns Authors Pierangela Samarati* Universitŕ degli Studi di Milano, Italy sabrina.decapitani@unimi.it Keywords cloud security confidentiality integrity availability secure data storage and processing Summary The cloud has emerged as a successful computing paradigm