National Library of Energy BETA

Sample records for lieberman-warner climate security

  1. Energy Market and Economic Impacts of S.2191, the Lieberman-Warner Climate Security Act of 2007

    Reports and Publications (EIA)

    2008-01-01

    This report responds to a request from Senators Lieberman and Warner for an analysis of S.2191, the Lieberman-Warner Climate Security Act of 2007. S.2191 is a complex bill regulating emissions of greenhouse gases through market- based mechanisms, energy efficiency programs, and economic incentives.

  2. Appendix D: Analysis of the Cap and Trade Features of the Lieberman-Warner Climate Security Act (S. 2191)

    E-Print Network [OSTI]

    D1 Appendix D: Analysis of the Cap and Trade Features of the Lieberman-Warner Climate Security Act of the Act's provisions as they relate to key features governing the cap-and-trade system, comparing results.1 A Changing Mix of Free Allocation and Auctioning....................................................... 13 D4

  3. Energy Efficiency and Renewable Energy Research, Development, and Deployment in Meeting Greenhouse Gas Mitigation Goals. The Case of the Lieberman-Warner Climate Security Act of 2007 (S. 2191)

    SciTech Connect (OSTI)

    Showalter, Sharon

    2010-06-01

    The U.S. federal government is considering actions to reduce greenhouse gas emissions. Renewable energy and energy efficiency technologies could help reduce greenhouse gas emissions, so the cost of these technologies could significantly influence the overall cost of meeting greenhouse gas limits. This paper examines the potential benefit of reduced technology cost by analyzing the case of the Lieberman-Warner Climate Security Act of 2007 (S.2191). This act had a goal of reducing national carbon emissions in 2050 to levels 72 percent below 2006 emission levels. In April 2008, the U.S. Department of Energy, Energy Information Administration (EIA) published an analysis of the effects of S.2191 on the U.S. energy sector. This report presents a similar analysis: both analyses examined the impacts of S.2191, and both used versions of the National Energy Modeling System. The analysis reported here used modified technology assumptions to reflect U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy (EERE) program goals. The results show that achieving EERE program goals could reduce the cost of meeting greenhouse gas limits, reduce the cost of renewable electricity generation and biofuels, and reduce energy intensity.

  4. Energy Efficiency and Renewable Energy Research, Development, and Deployment in Meeting Greenhouse Gas Mitigation Goals: The Case of the Lieberman-Warner Climate Security Act of 2007 (S.2191)

    SciTech Connect (OSTI)

    Showalter, S.; Wood, F.; Vimmerstedt, L.

    2010-06-01

    The U.S. federal government is considering actions to reduce greenhouse gas emissions. Renewable energy and energy efficiency technologies could help reduce greenhouse gas emissions, so the cost of these technologies could significantly influence the overall cost of meeting greenhouse gas limits. This paper examines the potential benefit of reduced technology cost by analyzing the case of the Lieberman-Warner Climate Security Act of 2007 (S.2191). This act had a goal of reducing national carbon emissions in 2050 to levels 72 percent below 2006 emission levels. In April 2008, the U.S. Department of Energy, Energy Information Administration (EIA) published an analysis of the effects of S.2191 on the U.S. energy sector. This report presents a similar analysis: both analyses examined the impacts of S.2191, and both used versions of the National Energy Modeling System. The analysis reported here used modified technology assumptions to reflect U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy (EERE) program goals. The results show that achieving EERE program goals could reduce the cost of meeting greenhouse gas limits, reduce the cost of renewable electricity generation and biofuels, and reduce energy intensity.

  5. Leveraging Existing Data Streams Toward Climate-Driven Emissions Inventorying and Reporting 

    E-Print Network [OSTI]

    Reith, C. C.; Shanin, D.

    2008-01-01

    for value. Even though the forthcoming legislation (e.g., the Lieberman-Warner American Climate Security Act) hasn?t yet passed, there are many reasons for a company or facility to be proactive in understanding and managing its carbon footprint... analytics tool and its integration with an energy management system, as used to guide climate-related strategic planning for a multinational mining and metallurgy company. Introduction Carbon regulation will soon join rising energy...

  6. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  7. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  8. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  9. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  10. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  11. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  12. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  13. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  14. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threatand the Threat of Climate Change,” The CNA Corporation, 2007

  15. Climate Change and National Security

    SciTech Connect (OSTI)

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  16. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict and Security University of Sussex, 18-19 October 2012 1 #12;Weather and climate ... vulnerability and security

  17. CLIMATE CHANGE AND INTERNATIONAL PEACE AND SECURITY

    E-Print Network [OSTI]

    CLIMATE CHANGE AND INTERNATIONAL PEACE AND SECURITY: Possible Roles for the U.N. Security Council in Addressing Climate Change By Dane Warren July 2015 #12;© 2015 Sabin Center for Climate Change Law, Columbia Law School The Sabin Center for Climate Change Law develops legal techniques to fight climate change

  18. CLIMATE CHANGE AND WATER SUPPLY SECURITY

    E-Print Network [OSTI]

    CLIMATE CHANGE AND WATER SUPPLY SECURITY: Reconfiguring Groundwater Management to Reduce with climate change, present a significant planning challenge for California's water agencies. This research Drought Vulnerability A White Paper from the California Energy Commission's California Climate

  19. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  20. Global climate change and international security

    SciTech Connect (OSTI)

    Rice, M.

    1991-01-01

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  1. Video: Veterans Advancing Clean Energy and Climate Security ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Veterans Advancing Clean Energy and Climate Security Video: Veterans Advancing Clean Energy and Climate Security November 11, 2013 - 12:45pm Addthis An error occurred. Try watching...

  2. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    data needed to construct effective climate change models and forecasts. Academic “Centers of Excellence” that focus on climate change

  3. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  4. The climate change and energy security nexus

    SciTech Connect (OSTI)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

  5. UKERC Project Final Report Climate change and energy security

    E-Print Network [OSTI]

    Jose, Joemon M.

    UKERC Project Final Report Climate change and energy security: Assessing the impact of information security Climate change and energy security Catherine Happer Research Associate, Glasgow University Media to the Bangladesh climate refugee and Glasgow flood scenarios 10 4. Audience studies: Energy security 12 Awareness

  6. Global climate change and international security.

    SciTech Connect (OSTI)

    Karas, Thomas H.

    2003-11-01

    This report originates in a workshop held at Sandia National Laboratories, bringing together a variety of external experts with Sandia personnel to discuss 'The Implications of Global Climate Change for International Security.' Whatever the future of the current global warming trend, paleoclimatic history shows that climate change happens, sometimes abruptly. These changes can severely impact human water supplies, agriculture, migration patterns, infrastructure, financial flows, disease prevalence, and economic activity. Those impacts, in turn, can lead to national or international security problems stemming from aggravation of internal conflicts, increased poverty and inequality, exacerbation of existing international conflicts, diversion of national and international resources from international security programs (military or non-military), contribution to global economic decline or collapse, or international realignments based on climate change mitigation policies. After reviewing these potential problems, the report concludes with a brief listing of some research, technology, and policy measures that might mitigate them.

  7. The Intersection of National Security and Climate Change

    E-Print Network [OSTI]

    The Intersection of National Security and Climate Change Informing Decision Makers A Symposium #12;2THE INTERSECTION OF NATIONAL SECURITY AND CLIMATE CHANGE In his May commencement speech to newly commissioned second lieutenants at West Point's grad- uation, President Obama warned that climate change is "a

  8. Climate Prediction Center Products in Support of National Security Mike Halpert, Deputy Director, Climate Prediction Center

    E-Print Network [OSTI]

    Miami, University of

    Climate Prediction Center Products in Support of National Security Mike Halpert, Deputy Director, Climate Prediction Center 5200 Auth Rd. Camp Springs, MD 20746 301-763-8000 x7535 Mike.Halpert@noaa.gov The Climate Prediction Center (CPC) delivers climate prediction, monitoring, and diagnostic products

  9. A deeper look at climate change and national security.

    SciTech Connect (OSTI)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  10. Interactions Between Energy Security and Climate Change: A Focus...

    Open Energy Info (EERE)

    Policy Sector: Energy, Climate Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website: www.sciencedirect.comscience?obMImg&imagekeyB6V2W-52SN633...

  11. Assessment of Select Climate Change Impacts On U.S. National Security

    E-Print Network [OSTI]

    Columbia University

    Assessment of Select Climate Change Impacts On U.S. National Security Center Assessment on climate change implications for U.S. National Security produced May 2008. The results Impacts on US National Security Table of Contents Executive Summary

  12. Climate change and energy security: an analysis of policy research

    SciTech Connect (OSTI)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The literature on climate change's impacts on energy security is scattered across disparate fields of research and schools of thought. Much of this literature has been produced outside of the academy by scholars and practitioners working in "think tanks," government agencies, and international/multilateral institutions. Here we reviewed a selected set of 58 articles and reports primarily from such sources and performed textual analysis of the arguments. Our review of this literature identifies three potential mechanisms for linking climate change and energy security: Climate change may 1) create second-order effects that may exacerbate social instability and disrupt energy systems; 2) directly impact energy supply and/or systems or 3) influence energy security through the effects of climate-related policies. We identify emerging risks to energy security driven by climate mitigation tech-nology choices but find less evidence of climate change's direct physical impacts. We used both empirical and qualitative selection factors for choosing the grey literature sample. The sources we selected were published in the last 5 years, available through electronic media and were written in language accessible to general policy or academic readers. The organi-zations that published the literature had performed previous research in the general fields of energy and/or climate change with some analytical content and identified themselves as non-partisan. This literature is particularly valuable to scholars because identifies understudied relationships that can be rigorously assessed through academic tools and methodologies and informs a translational research agenda that will allow scholars to engage with practitioners to address challenges that lie at the nexus of climate change and energy security.

  13. The Intersection of National Security and Climate Change

    SciTech Connect (OSTI)

    Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.; Sandusky, Jessica A.

    2014-07-29

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  14. Risk assessment of climate systems for national security.

    SciTech Connect (OSTI)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  15. Promoting India's development: energy security and climate security are convergent goals

    SciTech Connect (OSTI)

    Rajan, Gupta; Shankar, Harihar; Joshi, Sunjoy

    2009-01-01

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  16. Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts

    SciTech Connect (OSTI)

    Reno Harnish

    2011-08-16

    The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

  17. NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission

    E-Print Network [OSTI]

    Miami, University of

    . This information is downscaled and is then analyzed with respect to various ecosystem drivers such as rain during Security Challenges: Abstract Submission Presentation Title: Forecasting Global Ecosystem Change Pressure into statements of local consequence. We have been able to turn climate forecasts into ecosystem maps that reflect

  18. Climate Induced Spillover and Implications for U.S. Security.

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Naugle, Asmeret Bier; Backus, George A.; Lott, Kathryn Marie; Keller, Elizabeth; Kobos, Peter H.; Villa, Daniel

    2015-11-01

    Developing nations incur a greater risk to climate change than the developed world due to poorly managed human/natural resources, unreliable infrastructure and brittle governing/economic institutions. These vulnerabilities often give rise to a climate induced “domino effect” of reduced natural resource production-leading to economic hardship, social unrest, and humanitarian crises. Integral to this cascading set of events is increased human migration, leading to the “spillover” of impacts to adjoining areas with even broader impact on global markets and security. Given the complexity of factors influencing human migration and the resultant spill-over effect, quantitative tools are needed to aid policy analysis. Toward this need, a series of migration models were developed along with a system dynamics model of the spillover effect. The migration decision models were structured according to two interacting paths, one that captured long-term “chronic” impacts related to protracted deteriorating quality of life and a second focused on short-term “acute” impacts of disaster and/or conflict. Chronic migration dynamics were modeled for two different cases; one that looked only at emigration but at a national level for the entire world; and a second that looked at both emigration and immigration but focused on a single nation. Model parameterization for each of the migration models was accomplished through regression analysis using decadal data spanning the period 1960-2010. A similar approach was taken with acute migration dynamics except regression analysis utilized annual data sets limited to a shorter time horizon (2001-2013). The system dynamics spillover model was organized around two broad modules, one simulating the decision dynamics of migration and a second module that treats the changing environmental conditions that influence the migration decision. The environmental module informs the migration decision, endogenously simulating interactions/changes in the economy, labor, population, conflict, water, and food. A regional model focused on Mali in western Africa was used as a test case to demonstrate the efficacy of the model.

  19. Funding Proposal to the Konrad-Adenauer-Stiftung (KAS) (Regional Project Energy Security and Climate Change-Asia Pacific)

    E-Print Network [OSTI]

    Po, Lai-Man

    ; urban studies, climate law) Expertise (climate change negotiations and implications for energy policy Young School of Policy Studies, Georgia State University, USA (urban planning, vulnerability assessmentFunding Proposal to the Konrad-Adenauer-Stiftung (KAS) (Regional Project Energy Security

  20. Global climate change and international security. Report on a conference held at Argonne National Laboratory, May 8--10, 1991

    SciTech Connect (OSTI)

    Rice, M.

    1991-12-31

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  1. Global food security under climate change Josef Schmidhuber*

    E-Print Network [OSTI]

    5 million and 170 million additional people at risk of hunger by 2080) strongly depending on assumed who are at high risk of temporarily or permanently losing their access to the resources needed is climate variability, e.g., landless agricul- tural laborers, who almost wholly depend on agricultural

  2. The Arctic as a test case for an assessment of climate impacts on national security.

    SciTech Connect (OSTI)

    Taylor, Mark A.; Zak, Bernard Daniel; Backus, George A.; Ivey, Mark D.; Boslough, Mark Bruce Elrick

    2008-11-01

    The Arctic region is rapidly changing in a way that will affect the rest of the world. Parts of Alaska, western Canada, and Siberia are currently warming at twice the global rate. This warming trend is accelerating permafrost deterioration, coastal erosion, snow and ice loss, and other changes that are a direct consequence of climate change. Climatologists have long understood that changes in the Arctic would be faster and more intense than elsewhere on the planet, but the degree and speed of the changes were underestimated compared to recent observations. Policy makers have not yet had time to examine the latest evidence or appreciate the nature of the consequences. Thus, the abruptness and severity of an unfolding Arctic climate crisis has not been incorporated into long-range planning. The purpose of this report is to briefly review the physical basis for global climate change and Arctic amplification, summarize the ongoing observations, discuss the potential consequences, explain the need for an objective risk assessment, develop scenarios for future change, review existing modeling capabilities and the need for better regional models, and finally to make recommendations for Sandia's future role in preparing our leaders to deal with impacts of Arctic climate change on national security. Accurate and credible regional-scale climate models are still several years in the future, and those models are essential for estimating climate impacts around the globe. This study demonstrates how a scenario-based method may be used to give insights into climate impacts on a regional scale and possible mitigation. Because of our experience in the Arctic and widespread recognition of the Arctic's importance in the Earth climate system we chose the Arctic as a test case for an assessment of climate impacts on national security. Sandia can make a swift and significant contribution by applying modeling and simulation tools with internal collaborations as well as with outside organizations. Because changes in the Arctic environment are happening so rapidly, a successful program will be one that can adapt very quickly to new information as it becomes available, and can provide decision makers with projections on the 1-5 year time scale over which the most disruptive, high-consequence changes are likely to occur. The greatest short-term impact would be to initiate exploratory simulations to discover new emergent and robust phenomena associated with one or more of the following changing systems: Arctic hydrological cycle, sea ice extent, ocean and atmospheric circulation, permafrost deterioration, carbon mobilization, Greenland ice sheet stability, and coastal erosion. Sandia can also contribute to new technology solutions for improved observations in the Arctic, which is currently a data-sparse region. Sensitivity analyses have the potential to identify thresholds which would enable the collaborative development of 'early warning' sensor systems to seek predicted phenomena that might be precursory to major, high-consequence changes. Much of this work will require improved regional climate models and advanced computing capabilities. Socio-economic modeling tools can help define human and national security consequences. Formal uncertainty quantification must be an integral part of any results that emerge from this work.

  3. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  4. REVIEW OF THE POTENTIAL OF NUCLEAR HYDROGEN FOR ADDRESSING ENERGY SECURITY AND CLIMATE CHANGE

    SciTech Connect (OSTI)

    James E. O'Brien

    2010-06-01

    Nuclear energy has the potential to exert a major positive impact on energy security and climate change by coupling it to the transportation sector, primarily through hydrogen production. In the short term, this coupling will provide carbon-free hydrogen for upgrading increasingly lower quality petroleum resources such as oil sands, offsetting carbon emissions associated with steam methane reforming. In the intermediate term, nuclear hydrogen will be needed for large-scale production of infrastructure-compatible synthetic liquid fuels. In the long term, there is great potential for the use of hydrogen as a direct vehicle fuel, most likely in the form of light-duty pluggable hybrid hydrogen fuel cell vehicles. This paper presents a review of the potential benefits of large-scale nuclear hydrogen production for energy security (i.e. displacing imported petroleum) and reduction of greenhouse gas emissions. Lifecycle benefits of nuclear energy in this context are presented, with reference to recent major publications on this topic. The status of US and international nuclear hydrogen research programs are discussed. Industry progress toward consumer-grade hydrogen fuel cell vehicles are also be examined.

  5. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    SciTech Connect (OSTI)

    Greene, David L; Boudreaux, Philip R; Dean, David Jarvis; Fulkerson, William; Gaddis, Abigail; Graham, Robin Lambert; Graves, Ronald L; Hopson, Dr Janet L; Hughes, Patrick; Lapsa, Melissa Voss; Mason, Thom; Standaert, Robert F; Wilbanks, Thomas J; Zucker, Alexander

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  6. Appendix C: Cost of Climate Policy and the Waxman-Markey American Clean Energy and Security Act of 2009 (H.R. 2454)1

    E-Print Network [OSTI]

    Appendix C: Cost of Climate Policy and the Waxman-Markey American Clean Energy and Security Act The American Clean Energy and Security Act (H.R.2454) passed the House of Representatives after the completion version. H.R. 2454 is composed of five main titles. Title I deals with clean energy, setting up a combined

  7. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  8. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  9. UPDATE ON NUCLEAR PLANS AND CARBON LEGISLATION 1 Misc points re climate policies --Energy Security,

    E-Print Network [OSTI]

    Emissions Trading Workshop Purdue Climate Change Research Center April 30, 2010 #12;UPDATE ON NUCLEAR PLANS side must compromise ·Emissions trading aligns the incentives for both in same direction ·Nuclear

  10. Food Security Implication Of Climate Change In Developing Countries: Findings From A Case Study In Mali

    E-Print Network [OSTI]

    McCarl, Bruce A.

    In Mali Tanveer A. Butt* Assistant Research Scientist, Department of Agricultural Economics, Texas A IN DEVELOPING COUNTRIES: FINDINGS FROM A CASE STUDY IN MALI Abstract: We investigated the impact of climate findings from a case study conducted in Mali. A suite of biophysical models is used to project the impact

  11. Too Hot To Handle: Climate Change, Geopolitics, and U.S. National Security in 2025 

    E-Print Network [OSTI]

    Boggs, Jay W.; Chellinsky, Andrew; Ege, David; Hodges, Allen; Reynolds, Tripp; Williams, Adam

    2007-01-01

    Asia Largest underdeveloped oil and natural gas resources outside of OPEC Caspian Sea has 30 billion barrels of oil Turkmenistan has world’s 4th largest natural gas reserves US strategy for developed based on BTC pipeline and parallel natural gas... influence over Ukraine, Belarus, and Georgia in 2006 by cutting off natural gas until they agreed to price hikes. * What this history and climate change projections mean for Europe? Considerations/Issues: *While Russia has not used its role as Europe’s...

  12. Sandia Energy - Sandia Co-Hosts "Climate Risk Forum: Bridging...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Co-Hosts "Climate Risk Forum: Bridging Climate Science and Actuarial Practice" Home Climate Water Security Facilities News Global Climate & Energy NISAC News & Events Analysis...

  13. Nutrition and Food Security in a Changing Climate: Methods for predicting household coping strategy use and Food Security in the Ethiopian Context

    E-Print Network [OSTI]

    Hunnes, Dana Ellis

    2013-01-01

    S. M. , et al. (2007). Food, fibre and forest products. In138. Bishop, C. , and Hilhorst, D. (2010). “From food aidto food security: the case of the Safety Net policy in

  14. Interconnections of Agrobiodiversity and Food Security in Rural Yucatan, Mexico

    E-Print Network [OSTI]

    Sampson, Devon D.

    2015-01-01

    security presented by climate change and a growing worldwideabove, talked about climate change and a noticeable shift inalready overtaxed, and that climate change poses massive new

  15. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    (including small modular reactors) and of nuclear waste management facilities (e.g., storage and disposal-9720 Mobile: (505) 400-4220 Kevin a. McMahon, Manager nuclear Waste Disposal research & analysis CES&S Co of oklahoma hjsmith@ou.edu office: (405) 596-7239 Evaristo (tito) J. Bonano, Sr. Manager advanced nuclear

  16. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    management (in yellow). Data and knowledge management is an essential element of any long-term rD&D program National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  17. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    in pressurizer surge nozzles in the primary water piping for a commercial boiling water nuclear reactor #12 acentralroleinmanyapplicationssupportingnuclear reactor safety analysis, severe consequence analyses, and nuclear fuel cycle programs including

  18. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    the development of a nuclear powered moon base. While current concepts focus on Stirling engine power systems. For the current program, Sandia has developed a reactor simulator to drive Stirling engines under moon

  19. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    the turbine, and heat transfer in heat exchangers. What Thermodynamics Tells Us About Using Steam: The major drawback to using the traditional steam cycle is that most of the heat that remains in the steam after it leaves the turbine must be rejected from the fluid to turn it back into liquid water that can

  20. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    include: right Sized reactor, Supercritical Co2 Gas Fast reactor, Compact Sodium Fast reactor, and infrastructure problems. vision all of our reactor designs employ a concurrent engineering approach, and prometheus Space reactor. all of these reactor designs exist only on paper and have been produced as concepts

  1. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    between a coal/steam power plant and a nuclear/ Brayton power plant. Electrical power produced (kWh) Coal reactors, space reactors, concentrated solar power, gas turbines, and fossil energy. advanced

  2. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    experienced and participated in two transitions from `science to compliance,'(WIpp and YM) like those and characterization program and design validation experiments for Waste Isolation pilot plant (WIpp) · Development of the conceptual design for WIpp seal systems · humid-air corrosion testing of advanced alloys in support of waste

  3. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    and energy management. Sandia's projects include a collaborative smart-grid and grid-integration effort building at the center of Forest City's Mesa del Sol model sustainable community. It is the heart forecasting algorithms, and a display center for visualizing NEDO smart-grid system performance

  4. Seawalls Are Not Enough: Climate Change & U.S. Interests

    E-Print Network [OSTI]

    Freeman, Jody; Guzman, Andrew

    2009-01-01

    National SecurityImpacts on U.S. National Security (Ctr. for Int’l EarthClimate Change and National Security: An Agenda for Action,

  5. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  6. Climate and Transportation Solutions: Findings from the 2009 Asilomar Conference on Transportation and Energy Policy

    E-Print Network [OSTI]

    Sperling, Daniel; Cannon, James S.

    2010-01-01

    Canadian Oil Sands: Energy Security and Climate Change.positions in national security, energy programs, energy2009. “Indicators for energy security. ” Energy Policy 37 (

  7. Statement to the IAEA International Conference on Nuclear Security...

    Broader source: Energy.gov (indexed) [DOE]

    energy is a key part of addressing climate change, and ensuring nuclear security is integral to the expansion of carbon-free nuclear generation. On climate change, President...

  8. Welcome to the Pressure Cooker: How Climate Change is Making Our World More Violent and Less Secure -Presented by Dr. Marc Levy, Deputy Director,

    E-Print Network [OSTI]

    Kavanagh, Karen L.

    on environmental security, on global environmental governance, and on sustainability indicators. He has served

  9. Smallholder farmer welfare in a time of changing climate: the role of cropping decisions in local food security in the Nainital District of Uttarakhand, India

    E-Print Network [OSTI]

    Lin, Marena

    2013-01-01

    geting and the functional reduction in food subsidies, atof food security, the PDS appears at least functional. This

  10. radiation detection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, NNSA, Argentina Transition Radiation...

  11. Resource Limits and Conversion Efficiency with Implications for Climate Change

    E-Print Network [OSTI]

    Croft, Gregory Donald

    2009-01-01

    5.7 Energy Security Considerations and the Low Carbon Fuel1.6.3 Energy Security and the Low Carbon Fuel Standard . .The Canadian Oil Sands, Energy Security vs. Climate Change

  12. Office of Global Material Security | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  13. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    with portable solar panels, and increase the number ofon July 30, 2010. The solar panels power ra- dios, laptopduring testing of solar energy panels at Twen- tynine Palms,

  14. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    talking about energy inse- curity, water and food shortages,energy efficiency in Afghani- stan and Iraq. For every 50 trips for fuel or water

  15. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    in precipitation CO2 Desertification Permafrost melt Oceandrying that leads to desertification and famine. Many

  16. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    DoD The Marine Corps has a new Expeditionary Energy OfficeThe Marine Corps plans to cut its overall energy consumption2010 Marines dig a hole during testing of solar energy

  17. climate | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLos AlamosSimulation Initiative ccsi.jpglibfabric:Nauru: The Second

  18. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  19. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  20. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    This week, the Department of Energy's National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park,...

  1. India Water Week 2012 Water, Energy and Food Security : Call for Solutions, 10-14 April 2012, New Delhi ASSESSING THE IMPACT OF CLIMATE CHANGE ON

    E-Print Network [OSTI]

    Kumar, C.P.

    India Water Week 2012 ­ Water, Energy and Food Security : Call for Solutions, 10-14 April 2012, New in terms of the mean and its variability over a certain time-span and a certain area" and a statistically

  2. Biofuel policy must evaluate environmental, food security and energy goals to maximize net benefits

    E-Print Network [OSTI]

    Sexton, Steven E; Rajagapol, Deepak; Hochman, Gal; Zilberman, David D; Roland-Holst, David

    2009-01-01

    en- vironmental and energy-security im- peratives. However,rural development and energy-security objectives, and con-to mit- estation and energy security vary by igate climate

  3. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  4. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  5. Climate Science and Climate Economics

    E-Print Network [OSTI]

    Fisher, Anthony

    2014-01-01

    the World Bank by the Potsdam Institute for Climate ImpactResearch and Climate Analytics.of carbon under non-linear climate response. ESRI working

  6. maritime supply chain | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  7. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  8. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  9. CLIMATE RISK AND CLIMATE CHANGE

    E-Print Network [OSTI]

    Smerdon, Jason E.

    CLIMATE RISK AND CLIMATE CHANGE Scenarios of what the climate will be like 50 to 100 years from now associated with climate change demand these efforts continue. However, the long time horizons have led many decision makers to regard climate change as a problem of the distant future. But is it? I n many regions

  10. "Renewable Energy Transition and International Climate Cooperation

    E-Print Network [OSTI]

    Sheridan, Jennifer

    "Renewable Energy Transition and International Climate Cooperation: The German Experience" Jürgen and sustainability science; complex systems analysis, mathematical modeling and computer simulation; technology assessment, arms control and international security. For more information: eucenter

  11. EPRG Working Paper A New Energy Security Paradigm for

    E-Print Network [OSTI]

    Aickelin, Uwe

    security has been focused on the depletion of natural resources, particularly oil, natural gas and coalEPRG Working Paper A New Energy Security Paradigm for the Twenty-First Century William J. Nuttall in the early Nineteenth Century. Keywords Energy Security, Climate Change, Decarbonisation, Energy Alliance #12

  12. Framing a Comprehensive Approach to Climate Change 

    E-Print Network [OSTI]

    Boggs, Jay W.; Chellinsky, Andrew; Ege, David; Hodges, Allen; Reynolds, Tripp; Williams, Andy

    2007-01-01

    area of permafrost shifting – Russian Core of Western Siberia between Urals and Central Siberian Plateau. Estimates that Russia possesses 74 billion barrels of oil reserves and 1, 699 trillion cubic feet of natural gas proven reserves. Comparatively... to Handle: Climate Change, Geopolitics, and U.S. National Security in 2025 Jay Boggs Andrew Chellinsky David Ege Allen Hodges Tripp Reynolds Adam Williams 26 April 2007 Security Implications of Global Climate Change Capstone Team Jay W. Boggs – Russia...

  13. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  14. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  15. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  16. UCC UNIVERSITIES CLIMATE UNIVERSITY CLIMATE

    E-Print Network [OSTI]

    Kidston, Joseph

    CONSORTIUM UCC UNIVERSITIES CLIMATE UNIVERSITY CLIMATE World-class excellence Internationally recognised Australia based www.monash.edu.au/climate-consortium CONSORTIUM An International Collaborative of the institutional leads within the UCC: The University Climate Consortium (UCC) comprises four research intensive

  17. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  18. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  19. Climate Science and Public Policy in Iowa The productive soils and favorable climate of Iowa underpin the economy of our State.

    E-Print Network [OSTI]

    Debinski, Diane M.

    Climate Science and Public Policy in Iowa The productive soils and favorable climate of Iowa in our contributions to national and global food security. Changes in rainfall patterns and other climate and livelihoods. Subtle changes in climate can have large effects on agriculture, making it a sensitive indicator

  20. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability 

    E-Print Network [OSTI]

    Ragsdale, G.

    2010-01-01

    Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17th Symposium... for Improving Building Systems in Hot and Humid Climates Austin Texas August 24-25, 2010 Southwest Research Institute 1947 J. Dan Bates 2009 ? 60+ years, founded 1947 ? 3200+ employees ? 4000+ R&D projects/yr. ? $500M revenue ? 1200 acres ? 170 buildings...

  1. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  2. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  3. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  4. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  5. Climate Models and Climate Change Guillaume Mauger

    E-Print Network [OSTI]

    Climate Models and Climate Change Guillaume Mauger gmauger@uw.edu Climate Impacts Group University of Washington Outline: · Climate Change 101 · Why do we care? · Climate models: · About, UncertainDes, Performance, and Projec

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  9. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  10. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  11. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  12. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  13. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  14. Climate Change 2007: Mitigation of Climate Change.

    E-Print Network [OSTI]

    Schiavon, Stefano; Zecchin, Roberto

    2007-01-01

    2007: Mitigation of Climate Change. Full report. WorkingIntergovernmental Panel on Climate Change www.webcda.it LaIntergovernmental Panel on Climate Change”. Il Rapporto

  15. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  20. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  1. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  2. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  3. Climate Research Ocean Climate Sta1ons

    E-Print Network [OSTI]

    Climate Research Ocean Climate Sta1ons PI: Meghan Cronin Co Lab Review 2 hClimate Sta-ons are moored buoys #12;Ocean Climate Sta1ons 2014 PMEL Lab Review 5 Contribu-ng to NOAA's Goals

  4. Homeland Security: What Can Data Science Do?

    E-Print Network [OSTI]

    , Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security "halves" of the DHS Center for Visual and Data Analytics (CVADA), founded as the CCI Center by DHS in 2009.g.: ŘAssessing risks in waterways (NJ DOT) ŘPlanning for evacuations during heat events from climate change (CDC

  5. Climate change and climate variability affect all regions of the world. U.S. vulnerability to the changes and variations are not only dependent on changes within the U.S. but also on

    E-Print Network [OSTI]

    OVERVIEW Climate change and climate variability affect all regions of the world. U.S. vulnerability, it is important to assess emerging threats to national security due to climate change far into the future. Having access to relevant weather and climate data is essential for developing appropriate planning, risk

  6. Increasing homogeneity in global food supplies and the implications for food security

    E-Print Network [OSTI]

    Rieseberg, Loren

    Increasing homogeneity in global food supplies and the implications for food security Colin K Trust, 53115 Bonn, Germany; g CGIAR Research Program on Climate Change, Agriculture, and Food Security to the world's food supplies has been considered a potential threat to food security. However, changes

  7. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  8. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  10. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  11. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  12. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  13. Climate Systems and Climate Change Is Climate Change Real?

    E-Print Network [OSTI]

    Pan, Feifei

    Chapter 10 Climate Systems and Climate Change #12;Is Climate Change Real? 1980 1898 2005 2003 #12;Arctic Sea Ice Changes #12;Observed Global Surface Air Temperature #12;! Current climate: weather station data, remote sensing data, numerical modeling using General Circulation Models (GCM) ! Past climate

  14. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  15. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  16. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  17. Sandia Energy - Arctic Climate Measurements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Arctic Climate Measurements Home Climate & Earth Systems Climate Measurement & Modeling Arctic Climate Measurements Arctic Climate Measurementscwdd2015-05-08T01:51:20+00:00 A...

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  20. Review: Global Climate Change

    E-Print Network [OSTI]

    Smith, Jennifer

    2013-01-01

    introduction to global climate change, the greenhouseReview: Global Climate Change: A Primer By Orrin H PilkeyPilkey, Keith C. Global Climate Change: a primer. Durham,

  1. Apportioning Climate Change Costs

    E-Print Network [OSTI]

    Farber, Daniel A.

    2008-01-01

    Apportioning Climate Change Costs Daniel A. Farber* I. II.ON CLIMATE CHANGE FOUR QUESTIONS ABOUTof how to respond to climate change. Most public attention

  2. Climate Engineering Responses to Climate Emergencies

    E-Print Network [OSTI]

    Battisti, David

    Novim Climate Engineering Responses to Climate Emergencies Jason J. Blackstock David S. Battisti Santa Barbara, California #12;Climate Engineering Responses to Climate Emergencies This report should, A. A. N. Patrinos, D. P. Schrag, R. H. Socolow and S. E. Koonin, Climate Engineering Responses

  3. CLIMATE AND CLIMATE CHANGE CERTAINTIES AND UNCERTAINTIES

    E-Print Network [OSTI]

    Schwartz, Stephen E.

    CLIMATE AND CLIMATE CHANGE CERTAINTIES AND UNCERTAINTIES Stephen E. Schwartz http://www.ecd.bnl.gov/steve/schwartz.html December 4, 2001 Updated, March 4, 2002 #12;OUTLINE · Overview of the Earth climate system · Increased concentrations of "greenhouse gases" · Radiative forcing of climate change · Climate system response

  4. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  5. "Managing Department Climate Change"

    E-Print Network [OSTI]

    Sheridan, Jennifer

    "Managing Department Climate Change" #12;Presenters · Ronda Callister Professor, Department Department Climate? · Assesment is essential for determining strategies for initiating change · In a research climate · Each panelist will describe an intervention designed to improve department climate ­ Ronda

  6. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  7. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  8. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  9. Climate Change and Extinctions

    E-Print Network [OSTI]

    Sinervo, Barry

    2013-01-01

    Lectures presents: Climate Change and Extinctions Happening2013. He will present a climate change extinction model that

  10. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  11. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  13. Uncertainty in climate science and climate policy

    E-Print Network [OSTI]

    Uncertainty in climate science and climate policy Jonathan Rougier University of Bristol, UK Michel1.tex. 1 Introduction This essay, written by a statistician and a climate scientist, describes our view of the gap that exists between current practice in mainstream climate science, and the practical

  14. Use of Climate Data in Climate Research

    E-Print Network [OSTI]

    von Storch, Hans

    Use of Climate Data in Climate Research A Random Walk Through the MPI Hans von Storch Max and Technical Committee of the Global Climate Observing System in Hamburg, Germany September 19 - 22, 1994 #12;For which- Purposes do we Use 0bserved Data · Climate modelling - Design of parameterisations

  15. RELATING CLIMATE FORCINGS AND CLIMATE RESPONSE

    E-Print Network [OSTI]

    Schwartz, Stephen E.

    RELATING CLIMATE FORCINGS AND CLIMATE RESPONSE Stephen E. Schwartz Upton NY USA Bern, Switzerland change are tightly correlated. Forcing by GHGs only leads to extremely low climate sensitivity, well to rapid changes in forcings by stratospheric volcanic aerosols. Climate sensitivity is quite low, probably

  16. Climate Summary Working toward Climate Resilience

    E-Print Network [OSTI]

    Walter, M.Todd

    1 Climate Summary Working toward Climate Resilience A Summary Prepared for the Town of Germantown and decision-making as requested by the Town of Germantown. It identifies historic climate trends and introduces future projections and strategies to address the climate hazards most likely to affect Hudson

  17. CLIMATE VARIABILITY, CLIMATE CHANGE, AND WESTERN

    E-Print Network [OSTI]

    Keeton, William S.

    CHAPTER 13 CLIMATE VARIABILITY, CLIMATE CHANGE, AND WESTERN WILDFIRE WITH IMPLICATIONS FOR THE URBAN­WILDLAND INTERFACE William S. Keeton, Philip W. Mote and Jerry F. Franklin ABSTRACT Climate change hazards by the warmer, drier summers projected for much of the western U.S. by climate models would

  18. CLIMATE AND CLIMATE CHANGE SCIENTIFIC BACKGROUND

    E-Print Network [OSTI]

    Schwartz, Stephen E.

    CLIMATE AND CLIMATE CHANGE SCIENTIFIC BACKGROUND FOR INFORMED DECISION-MAKING Stephen E. Schwartz Climate Research Unit, East Anglia UK #12;INDICATIONS OF SYSTEMATIC WARMING IN RECENT YEARS The 1990s were call the anthropocene climate regime. Over the 20th century, human population quadrupled and energy

  19. Climate Change Action Pack Climate & Habitats

    E-Print Network [OSTI]

    Gunawardena, Arunika

    Climate Change Action Pack Climate & Habitats B A C K G R O U DN C H E C K ! Habitat, Food, Water. Disease,predation,pollution, accidents and climatic conditions are among other limiting factors which can affect an animal's ability to meet its needs. This section will look further into the impact of Climate

  20. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  1. Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity

    E-Print Network [OSTI]

    Cho, Yiseul

    2012-01-01

    The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

  2. Climate Change, Adaptation, and Development

    E-Print Network [OSTI]

    Cole, Daniel H.

    2008-01-01

    Climate Change, Adaptation, and Development Daniel H. Cole*THE COSTS OF CLIMATE CHANGE . ADAPTATIONCONVENTION ON CLIMATE CHANGE . IV. A.

  3. Climate Action Plan 2013 Update

    E-Print Network [OSTI]

    Rose, Michael R.

    UC Irvine Climate Action Plan 2013 Update #12;CLIMATE ACTION PLAN - 2013 UPDATE 1 TABLE OF CONTENTS CLIMATE PROTECTION GOALS...............................................................18 OPPORTUNITIES-2050 CLIMATE NEUTRALITY.........................................................29 MEDICALCENTER IMPLEMENTATION

  4. Climate Update Nolan Doesken

    E-Print Network [OSTI]

    Climate Update Nolan Doesken Colorado Climate Center Presented to Water Availability Task Force precip #12;Mtd ppt #12;Mtd ppt PRISM Climate Group, Oregon State University #12;Climate divisions defined by Dr. Klaus Wolter of NOAA's Climate Diagnostic Center in Boulder, CO #12;#12;Division 1 ­ Grand Lake 1

  5. Climate Change Scoping Plan

    E-Print Network [OSTI]

    Climate Change Scoping Plan a amework for change as approved Prepared by the California AirBackgroundBackgroundBackground ............................................................................................................................................................................................................................................................................................................................................................................................................ 4444 1. Climate Change Policy in California1. Climate Change Policy in California1. Climate Change Policy in California1. Climate Change Policy in California

  6. Climate change action plan

    E-Print Network [OSTI]

    Delivery Climate change action plan 2009-2011 #12;2 | Climate change action plan ©istockphoto.com #12;Climate Change Action Plan Climate change action plan | 3 Contents Overview 4 Preface and Introduction 5 Climate change predictions for Scotland 6 The role of forestry 7 Protecting and managing

  7. Climate Change Scoping Plan

    E-Print Network [OSTI]

    Climate Change Scoping Plan a amework for change Prepared by the California Air Resources BoardBackgroundBackgroundBackground ............................................................................................................................................................................................................................................................................................................................................................................................................ 4444 1. Climate Change Policy in California1. Climate Change Policy in California1. Climate Change Policy in California1. Climate Change Policy in California

  8. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  9. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  10. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  11. Protecting climate with forests.

    E-Print Network [OSTI]

    2008-01-01

    Changing feedbacks in the climate–biosphere system Front.313–32 Bonan G B 2008 Forests and climate change: forcings,feedbacks, and the climate benefits of forests Science

  12. Climate Code Foundation

    E-Print Network [OSTI]

    Barnes, Nick; Jones, David

    2011-07-05

    Climate Code Foundation - who are we? A non-profit organisation founded in August 2010; our goal is to promote the public understanding of climate science, by increasing the visibility and clarity of the software used in climate science...

  13. Climate Data Operators (CDO)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate Data Operators (CDO) Climate Data Operators (CDO) Description and Overview CDO is a large tool set for working on climate data. NetCDF 34, GRIB including SZIP compression,...

  14. Crop water stress under climate change uncertainty : global policy and regional risk

    E-Print Network [OSTI]

    Gueneau, Arthur

    2012-01-01

    Fourty percent of all crops grown in the world today are grown using irrigation, and shifting precipitation patterns due to climate change are viewed as a major threat to food security. This thesis examines, in the framework ...

  15. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  16. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  17. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  18. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  19. Climate change cripples forests

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate Change Cripples Forests Climate change cripples forests A team of scientists concluded that in the warmer and drier Southwest of the near future, widespread tree mortality...

  20. Climate change cripples forests

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate change cripples forests Climate change cripples forests A team of scientists concluded that in the warmer and drier Southwest of the near future, widespread tree mortality...

  1. Chapter 20 Climate

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in bold and acronyms are defined in Chapter 32, Glossary and Acronyms. Chapter 20 Climate This chapter describes existing climate conditions in the project area, and how the...

  2. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  3. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  4. Climatic Data Center Climatic Data Center

    E-Print Network [OSTI]

    NOAA's ational Climatic Data Center NOAA's ational Climatic Data Center 2008 Annual Report 2008NerS 12-16 DAtA ceNter iNFrAStrUctUre 16-20 USer eNGAGemeNt 21-24 eDUcAtioN/oUtreAch/WorKShoPS 26-31 em) National Climatic Data Center (NCDC) served the Nation as an authoritative resource for climate information

  5. Global Climate Change Impacts:Global Climate Change Impacts: Implications for Climate EngineeringImplications for Climate Engineering

    E-Print Network [OSTI]

    Polz, Martin

    Global Climate Change Impacts:Global Climate Change Impacts: Implications for Climate EngineeringImplications for Climate Engineering Thomas R. Karl Lead, NOAA climate services Director, NOAA National Climatic Data Center Global Climate Change Impacts in the United States October 29, 2009 #12;2Global Climate Change

  6. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  7. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  8. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  9. International Finance and Climate Change

    E-Print Network [OSTI]

    Zhang, Junshan

    International Finance and Climate Change Thursday, October 17, 2013 Breakfast ­ 8:30 a Principal Climate Change Specialist, Climate Business Group at International Finance Corporation, World Bank Group Vladimir Stenek Senior Climate Change Specialist, Climate Business Department of the International

  10. programs in climate change

    E-Print Network [OSTI]

    -Based Prediction for Energy Security 4 08 Our world is made up of complex systems--the weather, our economy, our of Energy's National Nuclear Security Administration by Los Alamos National Security, LLC, a team of Bechtel. LALP-08-027 Science-Based Prediction for Energy Security 4 08 www.lanl.gov circulation. Melting ice

  11. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  12. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  13. Arctic Climate Systems Analysis

    SciTech Connect (OSTI)

    Ivey, Mark D.; Robinson, David G.; Boslough, Mark B.; Backus, George A.; Peterson, Kara J.; van Bloemen Waanders, Bart G.; Swiler, Laura Painton; Desilets, Darin Maurice; Reinert, Rhonda Karen

    2015-03-01

    This study began with a challenge from program area managers at Sandia National Laboratories to technical staff in the energy, climate, and infrastructure security areas: apply a systems-level perspective to existing science and technology program areas in order to determine technology gaps, identify new technical capabilities at Sandia that could be applied to these areas, and identify opportunities for innovation. The Arctic was selected as one of these areas for systems level analyses, and this report documents the results. In this study, an emphasis was placed on the arctic atmosphere since Sandia has been active in atmospheric research in the Arctic since 1997. This study begins with a discussion of the challenges and benefits of analyzing the Arctic as a system. It goes on to discuss current and future needs of the defense, scientific, energy, and intelligence communities for more comprehensive data products related to the Arctic; assess the current state of atmospheric measurement resources available for the Arctic; and explain how the capabilities at Sandia National Laboratories can be used to address the identified technological, data, and modeling needs of the defense, scientific, energy, and intelligence communities for Arctic support.

  14. Climatic Change An Interdisciplinary,

    E-Print Network [OSTI]

    Reale, Marco

    1 23 Climatic Change An Interdisciplinary, International Journal Devoted to the Description, Causes and Implications of Climatic Change ISSN 0165-0009 Volume 107 Combined 3-4 Climatic Change (2011) 107:247-265 DOI available until 12 months after publication. #12;Climatic Change (2011) 107:247­265 DOI 10.1007/s10584

  15. CLIMATE PRODUCTS Basic Climatology

    E-Print Network [OSTI]

    CLIMATE PRODUCTS Basic Climatology Colorado Climate Center Funding provided by NOAA Sectoral the computer or a telephone system Data are collected by the National Climatic Data Center (NCDC), where) The original observations relate to WEATHER, not CLIMATE. But if we look at this information over a much longer

  16. Climate Science Andreas Schmittner

    E-Print Network [OSTI]

    Schmittner, Andreas

    Climate Science Andreas Schmittner Associate Professor College of Earth, Ocean, and Atmospheric Sciences Oregon State University Climate Change: A Workshop for Oregon Educators, Aug. 11, 2015 #12;Outline Past Present Future #12;Past Paleoclimate · How can we reconstruct past climate? · How did climate

  17. Climate Change and Transportation

    E-Print Network [OSTI]

    Minnesota, University of

    1 Climate Change and Transportation Addressing Climate Change in the Absence of Federal Guidelines;6 WSDOT Efforts · Climate Change Team · Project Level GHG Approach · Planning Level GHG Approach · Alternative Fuels Corridor · Recent legislation and research #12;7 WSDOT Efforts: Climate Change Team

  18. A Sparse Bayesian Model for Dependence Analysis of Extremes: Climate Applications

    E-Print Network [OSTI]

    Obradovic, Zoran

    , 360 Huntington Avenue, Boston, MA, USA Zoran Obradovic zoran@ist.temple.edu Center for Data Analysis relevant for improved understanding of hydrological extremes un- der climate variability and change and urgency across societal priorities, ranging from natural haz- ards and climate change to security

  19. Tribal Climate Change Webinars: BIA's Climate Change Competitive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    climate adaptation, ocean and coastal planning, and youth internships. SpeakersSean Hart, BIA Climate Change Coordinator, andRachael Novak, BIA Climate Science Coordinator,...

  20. Formulating Climate Change Scenarios to Inform Climate - Resilient...

    Open Energy Info (EERE)

    Formulating Climate Change Scenarios to Inform Climate - Resilient Development Strategies Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Formulating Climate Change...

  1. Climate Action Champions: Sonoma County Regional Climate Protection...

    Energy Savers [EERE]

    Sonoma County Regional Climate Protection Authority, CA Climate Action Champions: Sonoma County Regional Climate Protection Authority, CA In 2005, nine cities and the County of...

  2. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  3. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  4. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  5. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  6. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  7. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  8. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  9. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  10. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  11. Climate change risk and response

    E-Print Network [OSTI]

    Kahrl, Fredrich; Roland-Holst, David

    2008-01-01

    the Potential Consequences of Climate Variability and Changeand Kate Scow. 2006. “Climate Change: Page 117 ChallengesLandscapes. ” California Climate Change Center White Paper.

  12. Climate & Environment | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate & Environment SHARE Climate and Environment Climate and environmental scientists at ORNL conduct research, develop technology and perform analyses to understand and predict...

  13. Climate change risk and response

    E-Print Network [OSTI]

    Kahrl, Fredrich; Roland-Holst, David

    2008-01-01

    and Kate Scow. 2006. “Climate Change: Page 117 ChallengesLandscapes. ” California Climate Change Center White Paper.Sea Level. ” California Climate Change Center White Paper.

  14. Climate change risk and response

    E-Print Network [OSTI]

    Kahrl, Fredrich; Roland-Holst, David

    2008-01-01

    The Potential Impacts of Climate Change on Inshore Squid:Fifth Annual California Climate Change Research Conference,Potential Impacts of Climate Change on U.S. Transportation.

  15. Review: Preparing for Climate Change

    E-Print Network [OSTI]

    Kunnas, Jan

    2013-01-01

    Review: Preparing for Climate Change By Michael D.Stephen, Preparing for Climate Change. A Boston Review Book.alkaline paper. “Climate change is inevitable, but disaster

  16. Urban Growth and Climate Change

    E-Print Network [OSTI]

    Kahn, Matthew E.

    2008-01-01

    2007a The Economic Impacts of Climate Change: Evidence fromGreenstone. 2007b. Climate Change, Mortality and Adaptation:and Ariel Dinar, 1999, Climate Change, Agriculture, and

  17. The South East Asian Climate Assessment & Dataset system

    E-Print Network [OSTI]

    Stoffelen, Ad

    harvests by 40% BMKG: SACA&D General Introduction ­ p.4 #12;Large regional variations source: IPCC (2007 & international policy makers · agricultural sector (food security) · water management · insurance sector · aid&D operationally · Climate Services - what information is in the database? - how to extract and present information

  18. 48 CRO MAR/APR 2008 Climate Change

    E-Print Network [OSTI]

    Hoffman, Andrew J.

    Care Products at Whirlpool, "In the 1980s, energy efficiency was number 10, 11 or 12 in consumer change and energy security. The time for debating whether climate change is real has past. It is time the next two to five years, and companies want a seat at the table to influence what form those regulations

  19. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  20. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  1. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  2. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  3. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  4. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  5. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  6. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  7. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  8. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  9. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  10. Uncertainty in Simulating Wheat Yields Under Climate Change

    SciTech Connect (OSTI)

    Asseng, S.; Ewert, F.; Rosenzweig, C.; Jones, J.W.; Hatfield, Jerry; Ruane, Alex; Boote, K. J.; Thorburn, Peter; Rotter, R.P.; Cammarano, D.; Brisson, N.; Basso, B.; Martre, P.; Aggarwal, P.K.; Angulo, C.; Bertuzzi, P.; Biernath, C.; Challinor, AJ; Doltra, J.; Gayler, S.; Goldberg, R.; Grant, Robert; Heng, L.; Hooker, J.; Hunt, L.A.; Ingwersen, J.; Izaurralde, Roberto C.; Kersebaum, K.C.; Mueller, C.; Naresh Kumar, S.; Nendel, C.; O'Leary, G.O.; Olesen, JE; Osborne, T.; Palosuo, T.; Priesack, E.; Ripoche, D.; Semenov, M.A.; Shcherbak, I.; Steduto, P.; Stockle, Claudio O.; Stratonovitch, P.; Streck, T.; Supit, I.; Tao, F.; Travasso, M.; Waha, K.; Wallach, D.; White, J.W.; Williams, J.R.; Wolf, J.

    2013-09-01

    Anticipating the impacts of climate change on crop yields is critical for assessing future food security. Process-based crop simulation models are the most commonly used tools in such assessments1,2. Analysis of uncertainties in future greenhouse gas emissions and their impacts on future climate change has been increasingly described in the literature3,4 while assessments of the uncertainty in crop responses to climate change are very rare. Systematic and objective comparisons across impact studies is difficult, and thus has not been fully realized5. Here we present the largest coordinated and standardized crop model intercomparison for climate change impacts on wheat production to date. We found that several individual crop models are able to reproduce measured grain yields under current diverse environments, particularly if sufficient details are provided to execute them. However, simulated climate change impacts can vary across models due to differences in model structures and algorithms. The crop-model component of uncertainty in climate change impact assessments was considerably larger than the climate-model component from Global Climate Models (GCMs). Model responses to high temperatures and temperature-by-CO2 interactions are identified as major sources of simulated impact uncertainties. Significant reductions in impact uncertainties through model improvements in these areas and improved quantification of uncertainty through multi-model ensembles are urgently needed for a more reliable translation of climate change scenarios into agricultural impacts in order to develop adaptation strategies and aid policymaking.

  11. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  12. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  13. Climate and Climate Change COURSE: .............................................................................. EAS B8800

    E-Print Network [OSTI]

    Wolberg, George

    Climate and Climate Change COURSE with a focus on energy transport. Finally, we tackle natural and anthropogenic climate change. This course. Synthesize and apply theory of the various natural and anthropogenic climate change mechanisms to explain

  14. FUTURE CLIMATE ANALYSIS

    SciTech Connect (OSTI)

    R.M. Forester

    2000-03-14

    This Analysis/Model Report (AMR) documents an analysis that was performed to estimate climatic variables for the next 10,000 years by forecasting the timing and nature of climate change at Yucca Mountain (YM), Nevada (Figure l), the site of a potential repository for high-level radioactive waste. The future-climate estimates are based on an analysis of past-climate data from analog meteorological stations, and this AMR provides the rationale for the selection of these analog stations. The stations selected provide an upper and a lower climate bound for each future climate, and the data from those sites will provide input to the infiltration model (USGS 2000) and for the total system performance assessment for the Site Recommendation (TSPA-SR) at YM. Forecasting long-term future climates, especially for the next 10,000 years, is highly speculative and rarely attempted. A very limited literature exists concerning the subject, largely from the British radioactive waste disposal effort. The discussion presented here is one method, among many, of establishing upper and lower bounds for future climate estimates. The method used here involves selecting a particular past climate from many past climates, as an analog for future climate. Other studies might develop a different rationale or select other past climates resulting in a different future climate analog.

  15. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  16. Climate and energy policy for U.S. passenger vehicles : a technology-rich economic modeling and policy analysis

    E-Print Network [OSTI]

    Karplus, Valerie J

    2011-01-01

    Climate and energy security concerns have prompted policy action in the United States and abroad to reduce petroleum use and greenhouse gas (GHG) emissions from passenger vehicles. Policy affects the decisions of firms and ...

  17. TITLE: Conversion of a Science Writer: From Climate Change to GMOs With author/journalist Mark Lynas

    E-Print Network [OSTI]

    Walter, M.Todd

    the pros and cons of Genetically Modified Crops and the latest controversies related to GMOs. Mark shared to feed the world at a time of increasing pressure on food safety and security with climate change

  18. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  19. Climate WorkshopsClimate Workshops for Department Chairsp

    E-Print Network [OSTI]

    Tilbury, Dawn

    Climate WorkshopsClimate Workshops for Department Chairsp University of Wisconsin ADVANCE-IT Slides) #12;Why focus on departmental climate? Individuals experience climate in their immediate workplace negative climate than male faculty Improving department climate is critical for retention and advancement

  20. Climate in China ! Climate is weather over time.

    E-Print Network [OSTI]

    Pan, Feifei

    Climate in China #12;! Climate is weather over time. ! Climatology is the study of climate. ! Climatic regions are areas with similar weather statistics. ! Climate influences ecosystems. ! On land, the location of climatic regions determines the location of ecosystems (e.g., forest, grassland, savanna

  1. ETHICAL DILEMMAS IN CLIMATE CHANGE

    E-Print Network [OSTI]

    Chauve, Cedric

    ETHICAL DILEMMAS IN CLIMATE CHANGE RECOMMENDATIONS FOR CANADIAN CLIMATE POLICY Roundtable Dialogue AND SELECTED THE FOLLOWING CLIMATE CHANGE POLICY AREAS FOR DETAILED DISCUSSION. PARTICIPANTS THEN WORKED Dilemmas in Climate Change roundtable dialogue, convened by Simon Fraser University's Centre for Dialogue

  2. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  3. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  4. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  5. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  6. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  7. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  8. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  10. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  11. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  12. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  13. The Climate Policy Dilemma

    E-Print Network [OSTI]

    Pindyck, Robert S.

    Climate policy poses a dilemma for environmental economists. The economic argument for stringent greenhouse gas (GHG) abatement is far from clear. There is disagreement among both climate scientists and economists concerning ...

  14. The Climate Policy Dilemma

    E-Print Network [OSTI]

    Pindyck, Robert S.

    Climate policy poses a dilemma for environmental economists. The economic argument for stringent GHG abatement is far from clear. There is disagreement among both climate scientists and economists over the likelihood of ...

  15. Indigenous Climate Justice Symposium

    Broader source: Energy.gov [DOE]

    The Indigenous Climate Justice Symposium brings together Native speakers who are working to keep fossil fuels in the ground, by stopping coals terminals, oil trains and fracking, and protecting treaty resources from the threat of climate change.

  16. Climate Change Adaptation

    Broader source: Energy.gov [DOE]

    DOE is adapting to climate change by applying a risk-based resiliency approach to identify and minimize climate-related vulnerabilities across all DOE policies, programs and activities.

  17. Climate Leadership Conference

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Climate Leadership Conference is your annual exchange for addressing global climate change through policy, innovation, and business solutions. Forward-thinking lead­ers from busi­ness, gov­ern...

  18. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  19. METEOROLOGICAL Journal of Climate

    E-Print Network [OSTI]

    Feng, Ming

    AMERICAN METEOROLOGICAL SOCIETY Journal of Climate EARLY ONLINE RELEASE This is a preliminary PDF it is available. © 201 American Meteorological Society1 #12;Sun et al. climate downscaling of the Australian currents 1 Marine downscaling of a future climate scenario for Australian boundary currents Chaojiao Sun

  20. CLIMATE CHANGE AND BIODIVERSITY

    E-Print Network [OSTI]

    CLIMATE CHANGE AND BIODIVERSITY THE CONTRIBUTION OF THE NATIONAL MUSEUM OF NATURAL HISTORY #12;At, the origin of which is mainly related to human activities. For the first time climate change sends a strong of climate change and that will fully find material expression in the debates. What will the world we shape

  1. CLIMATE CHANGE & THE GREENHOUSE

    E-Print Network [OSTI]

    Tobar, Michael

    CLIMATE CHANGE & THE GREENHOUSE EFFECT #12;This development of these materials was supported under.nasa.gov/Features/BlueMarble/BlueMarble_history.php © 2014 University of Western Australia ISBN 978-0-646-93241-5 Title: Climate change and the greenhouse OF CONTENTS TABLE OF CONTENTS Introduction to climate change resources 5 Alternative conceptions 6 References

  2. Forest Research: Climate Change

    E-Print Network [OSTI]

    Forest Research: Climate Change projects Forest Research is part of the Forestry Commission of climate change-related research is wide-ranging, covering impact assessment and monitoring, adaptation around a quarter of its research budget with Forest Research on climate change and related programmes

  3. Climate change vulnerability

    E-Print Network [OSTI]

    Hilderbrand, Robert H.

    Climate change vulnerability assessment of the Verde Island Passage, Philippines #12;ii This document should be cited as: R. Boquiren, G. Di Carlo, and M.C. Quibilan (Eds). 2010. Climate Change, Marine Climate Change Program Conservation International­Global Marine Division epidgeon

  4. Environment and Climate Change

    E-Print Network [OSTI]

    Galles, David

    Migration, Environment and Climate Change: ASSESSING THE EVIDENCE #12;The opinions expressed;Migration, Environment and Climate Change: ASSESSING THE EVIDENCE Edited by Frank Laczko and Christine with with the financial support of #12;3 Migration, Environment and Climate Change: Assessing the Evidence Contents

  5. Campus Climate Camden Campus

    E-Print Network [OSTI]

    Hanson, Stephen José

    Campus Climate Report Camden Campus New Brunswick/Piscataway Campus Newark Campus Student Survey #12;I. INTRODUCTION Executive Summary The Rutgers Campus Climate Survey was designed to determine how University, the campus climate surveys revealed strong areas of satisfaction with the Rutgers University

  6. Climate Change Workshop 2007

    E-Print Network [OSTI]

    Nebraska-Lincoln, University of

    1 Climate Change Workshop 2007 Adaptive Management and Resilience Relevant for the Platte River, UNL Climate Change Workshop 2007 · Resilience ·Why it matters · Adaptive Management ·How it helps ·Adaptive Capacity · What it is Overview Climate Change Workshop 2007 "A public Domain, once a velvet carpet

  7. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  8. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  9. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  10. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  11. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  12. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  13. Climate2012 State of the

    E-Print Network [OSTI]

    Greenslade, Diana

    Climate2012 State of the #12;2 State of the Climate 2012 Climate2012 State of the The previous State of the Climate, released in March 2010 (www.csiro.au/Outcomes/Climate/Understanding/State-of-the- Climate.aspx) highlighted a multi-decadal warming trend over Australia's land and oceans, an increase

  14. Climate Change Economics and Policy

    E-Print Network [OSTI]

    Romano, Daniela

    AFRICA COLLEGE Centre for Climate Change Economics and Policy Adapting to Climate Change 3 CLIMATE...Furthermore, there is strong scientific evidence that climate change will disrupt the global economy, environment and society a growing population in a changing climate is, therefore, a major global challenge. Changes in climate

  15. Video: Veterans Advancing Clean Energy and Climate Security | Department of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservationBio-Inspired SolarAbout /Two0 -UsingHeat & Cool »Video GamesTraining

  16. Interactions Between Energy Security and Climate Change: A Focus on

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA JumpDuimenMakingBiofuels Jump to:Energy/InfiniteInteracta Jump

  17. Veterans Advancing Clean Energy and Climate Security Champions of Change |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment| Department of Energy OfficeResourcesmap|Department ofEEREDepartment

  18. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  19. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  20. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  1. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  2. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  3. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  4. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  5. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  6. Future Climate Analysis

    SciTech Connect (OSTI)

    James Houseworth

    2001-10-12

    This Analysis/Model Report (AMR) documents an analysis that was performed to estimate climatic variables for the next 10,000 years by forecasting the timing and nature of climate change at Yucca Mountain (YM), Nevada (Figure 1), the site of a potential repository for high-level radioactive waste. The future-climate estimates are based on an analysis of past-climate data from analog meteorological stations, and this AMR provides the rationale for the selection of these analog stations. The stations selected provide an upper and a lower climate bound for each future climate, and the data from those sites will provide input to the infiltration model (USGS 2000) and for the total system performance assessment for the Site Recommendation (TSPA-SR) at YM. Forecasting long-term future climates, especially for the next 10,000 years, is highly speculative and rarely attempted. A very limited literature exists concerning the subject, largely from the British radioactive waste disposal effort. The discussion presented here is one method, among many, of establishing upper and lower bounds for future climate estimates. The method used here involves selecting a particular past climate from many past climates, as an analog for future climate. Other studies might develop a different rationale or select other past climates resulting in a different future climate analog. Revision 00 of this AMR was prepared in accordance with the ''Work Direction and Planning Document for Future Climate Analysis'' (Peterman 1999) under Interagency Agreement DE-AI08-97NV12033 with the U.S. Department of Energy (DOE). The planning document for the technical scope, content, and management of ICN 01 of this AMR is the ''Technical Work Plan for Unsaturated Zone (UZ) Flow and Transport Process Model Report'' (BSC 2001a). The scope for the TBV resolution actions in this ICN is described in the ''Technical Work Plan for: Integrated Management of Technical Product Input Department''. (BSC 2001b, Addendum B, Section 4.1).

  7. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  8. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  9. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  10. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  11. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  13. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  14. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  15. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  16. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  17. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  18. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  19. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  20. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  1. Climate Change Review of Muller's chapter on Climate Change from

    E-Print Network [OSTI]

    Browder, Tom

    Climate Change · Review of Muller's chapter on Climate Change from Physics for Future Society) controversy on climate change (e.g. resignation of Hal Lewis, Ivar Giaever and other notable. #12;Some climate changes basics · IPCC = Intergovernmental Panel on Climate Change · The IPCC

  2. Climate Sensitivity of the Community Climate System Model Version 4

    E-Print Network [OSTI]

    Bitz, Cecilia

    Climate Sensitivity of the Community Climate System Model Version 4 C. M. Bitz 1 , K.M. Shell 2 , P. Equilibrium climate sensitivity of the Community Climate System Model Version 4 (CCSM4) is 3.20 C for 1 version (CCSM3). The transient climate sensitivity of CCSM4 at 1 resolution is 1.72 C, which is about 0

  3. Climate Change: One, or Many? Professor of Climate and Culture

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: One, or Many? Mike Hulme Professor of Climate and Culture Department of Geography Presidential Session: `Geographies of Climate Change' AAG Annual Conference, Tampa, Florida, 7-11 April 2014 climate system' 2 `The Plan' #12;One Climate? "... a complex, interactive system consisting

  4. Climate closure: Game over for climate skep4cs

    E-Print Network [OSTI]

    Lovejoy, Shaun

    Climate closure: Game over for climate skep4cs S. Lovejoy, McGill, Physics McGill, Macdonald College Campus 4 November, 2014 #12;What is the climate climate is what you expect... "Climate is what you expect, weather is what you get." -Lazarus Long

  5. Climate history and paleoclimate -HS 2011 Future climate

    E-Print Network [OSTI]

    Gilli, Adrian

    Climate history and paleoclimate - HS 2011 Future climate Climate History & Paleoclimate - December 9, 2011 1 #12;Climate history and paleoclimate - HS 2011 IPCC 2007 4th Assessment report (AR4) More information can be found: http://www.ipcc.ch/ Remark: 5th assessment report is due in 2013/2014 2 #12;Climate

  6. Climate history and paleoclimate -HS 2011 Climate proxies

    E-Print Network [OSTI]

    Gilli, Adrian

    Climate history and paleoclimate - HS 2011 Climate proxies 18O Climate History & Paleoclimate ­ September 30, 2011 #12;How do we know about the past? Instrumental Historical Through proxies Climate proxies Climate history and paleoclimate - HS 2011 #12;What is a `proxy'? "Proxy, as used here

  7. Conservation and Global Climate Change

    E-Print Network [OSTI]

    Landweber, Laura

    V.6 Conservation and Global Climate Change Diane M. Debinski and Molly S. Cross OUTLINE 1. Introduction 2. How climate is changing 3. Environmental responses to climate change 4. Consequences of climate the coming decades will be preserving biodiversity in the face of climate change. It has become increasingly

  8. Abrupt Climate Change Inevitable Surprises

    E-Print Network [OSTI]

    Abrupt Climate Change Inevitable Surprises Committee on Abrupt Climate Change Ocean Studies Board of Congress Cataloging-in-Publication Data Abrupt climate change : inevitable surprises / Committee on Abrupt Climate Change, Ocean Studies Board, Polar Research Board, Board on Atmospheric Sciences and Climate

  9. Climate Change Proposed Scoping Plan

    E-Print Network [OSTI]

    Climate Change Proposed Scoping Plan a amework for change Prepared by the California Air ResourcesBackgroundBackgroundBackground ............................................................................................................................................................................................................................................................................................................................................................................................................ 4444 1. Climate Change Policy in California1. Climate Change Policy in California1. Climate Change Policy in California1. Climate Change Policy in California

  10. Climate Change and Runoff Management

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Climate Change and Runoff Management in Wisconsin Fox-Wolf Watershed Alliance May 10, 2011 David S of Engineering #12;Overview · Understanding climate change · Wisconsin's changing climate · Expected impacts · Adaptation strategies #12;What is climate? "Climate is properly the long average of weather in a single place

  11. The Climate Impacts LINK Project

    E-Print Network [OSTI]

    Feigon, Brooke

    The Climate Impacts LINK Project The Climatic Research Unit, University of East Anglia Funded by the UK Department of the Environment, Transport and the Regions, Contract Ref EPG 1/1/68 The Climate Impacts LINK Project: Applying Results from the Hadley Centre's Climate Change Experiments for Climate

  12. Future Climate Analysis

    SciTech Connect (OSTI)

    C. G. Cambell

    2004-09-03

    This report documents an analysis that was performed to estimate climatic variables for the next 10,000 years by forecasting the timing and nature of climate change at Yucca Mountain, Nevada, the site of a repository for spent nuclear fuel and high-level radioactive waste. The future-climate estimates are based on an analysis of past-climate data from analog meteorological stations, and this report provides the rationale for the selection of these analog stations. The stations selected provide an upper and a lower climate bound for each future climate, and the data from those sites will provide input to the following reports: ''Simulation of Net Infiltration for Present-Day and Potential Future Climates'' (BSC 2004 [DIRS 170007]), ''Total System Performance Assessment (TSPA) Model/Analysis for the License Application'' (BSC 2004 [DIRS 168504]), ''Features, Events, and Processes in UZ Flow and Transport'' (BSC 2004 [DIRS 170012]), and ''Features, Events, and Processes in SZ Flow and Transport'' (BSC 2004 [DIRS 170013]). Forecasting long-term future climates, especially for the next 10,000 years, is highly speculative and rarely attempted. A very limited literature exists concerning the subject, largely from the British radioactive waste disposal effort. The discussion presented here is one available forecasting method for establishing upper and lower bounds for future climate estimates. The selection of different methods is directly dependent on the available evidence used to build a forecasting argument. The method used here involves selecting a particular past climate from many past climates, as an analog for future climate. While alternative analyses are possible for the case presented for Yucca Mountain, the evidence (data) used would be the same and the conclusions would not be expected to drastically change. Other studies might develop a different rationale or select other past climates resulting in a different future climate analog. Other alternative approaches could include simulation of climate over the 10,000-year period; however, this modeling extrapolation is well beyond the bounds of current scientific practice and would not provide results with better confidence. A corroborative alternative approach may be found in ''Future Climate Analysis-10,000 Years to 1,000,000 Years After Present'' (Sharpe 2003 [DIRS 161591]). The current revision of this report is prepared in accordance with ''Technical Work Plan for: Unsaturated Zone Flow Analysis and Model Report Integration'' (BSC 2004 [DIRS 169654]).

  13. Climate Change, Drought & Environment

    Broader source: Energy.gov [DOE]

    Afternoon Plenary Session: Current Trends in the Advanced Bioindustry Climate Change, Drought, and Environment—Michael Champ, Executive Director, The Sustainable Water Challenge

  14. Climate Change Webinar Series

    Broader source: Energy.gov [DOE]

    Experts will provide findings from the Quadrennial Energy Review (QER) and outline federal energy policy objectives, proposals, and actions as they relate to climate change and resilience for...

  15. Protecting climate with forests.

    E-Print Network [OSTI]

    2008-01-01

    much more than carbon sequestration does, and often in abiophysics, carbon sequestration, climate change, climatethe accompanying carbon sequestration does—and sometimes in

  16. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  17. Assessment of the Effects of Climate Change on Federal Hydropower

    SciTech Connect (OSTI)

    Sale, Michael J.; Shih-Chieh, Kao; Ashfaq, Moetasim; Kaiser, Dale P.; Martinez, Rocio; Webb, Cindy; Wei, Yaxing

    2012-10-01

    As directed by Congress in Section 9505 of the SECURE Water Act of 2009 (Public Law 111-11), the US Department of Energy (DOE), in consultation with the federal Power Marketing Administrations (PMAs) and other federal agencies, including federal dam owners, has prepared a comprehensive assessment examining the effects of climate change on water available for hydropower at federal facilities and on the marketing of power from these federal facilities. This Oak Ridge National Laboratory report, referred to as the “9505 Assessment,” describes the technical basis for the report to Congress that was called for in the SECURE Water Act.

  18. 1DANGEROUS CLIMATE CHANGE IN BRAZIL Dangerous Climate

    E-Print Network [OSTI]

    1DANGEROUS CLIMATE CHANGE IN BRAZIL Dangerous Climate A BrAzil-UK AnAlysis of ClimAte ChAnge And deforestAtion impACts in the AmAzon Change in Brazil #12;3DANGEROUS CLIMATE CHANGE IN BRAZIL April 2011Alysis of ClimAte ChAnge And deforestAtion impACts in the AmAzon Change in Brazil #12;4 DANGEROUS CLIMATE CHANGE

  19. ClimateChangeLIVE Webcast: Join the Climate Conversation

    Broader source: Energy.gov [DOE]

    Join ClimateChangeLIVE's webcast, bringing together students and climate experts for a discussion about climate change and what students and classes around the country are doing to be part of the climate solution. Students will be able to interact with climate scientists and experts online through Facebook and Twitter. A GreenWorks! grant will be offered to help schools with climate action projects.

  20. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  1. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  2. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  3. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  4. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  5. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  6. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  7. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  8. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  9. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  10. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  11. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  12. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  13. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  14. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  15. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  16. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  17. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  18. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  19. Global air quality and climate

    E-Print Network [OSTI]

    2012-01-01

    Evaluation of Chemistry- Climate Models 5, 2010. 320 S. Wu,and R. Van Dorland, in Climate Change 2007: The PhysicalInter- governmental Panel on Climate Change, ed. D. Qin, M.

  20. Climate Change at Annual Timescales

    E-Print Network [OSTI]

    Stine, Alexander Robin

    2010-01-01

    1900–93, Journal of Climate, 10 (5), 1004–1020, 1997. Zhou,University of East Anglia’s Climate Research Unit (Jones etand those from WCRP “Climate of the Twentieth Century”

  1. Climate Change and Conceptual Change

    E-Print Network [OSTI]

    Clark, David Joseph

    2013-01-01

    1.1.2 The Stark Reality of Climate Change . . . . . . . .1.2 Climate Change as a BehavioralEducation for Climate Change . . . . 1.4.1 The Numerically

  2. Climate Action Plan 2009 Sustainability

    E-Print Network [OSTI]

    Capogna, Luca

    Climate Action Plan September 2009 Sustainability Council This plan outlines methods by which. This document is publicly available at http://sustainability.uark.edu. #12;2 University of Arkansas Climate....................................................................................................................................7 Climate Action Plan Committee

  3. book review: Climate change mapped

    E-Print Network [OSTI]

    Shanahan, Mike

    2012-01-01

    of millions 2 .   Climate change is a moving target and introductions  to  climate change’, the Atlas stands out media reporting on climate change.   Cambridge University 

  4. Climate Change at Annual Timescales

    E-Print Network [OSTI]

    Stine, Alexander Robin

    2010-01-01

    carbon cycling to global climate change, Nature, 393 (6682),2005. Meehl, G. , et al. , Climate Change 2007: The PhysicalIntergovernmental Panel on Climate Change, chap. 10. Global

  5. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  6. Massachusetts Takes On Climate Change

    E-Print Network [OSTI]

    Kimmell, Ken; Laurie, Burt

    2009-01-01

    to promote new technologies to fight climate change as theON CLIMATE CHANGE dard is a market-based, technology-neutraland technologies. 9. Facilities will calculate emissions using The Climate

  7. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  8. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  9. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  10. Global Climate Autumn 2014

    E-Print Network [OSTI]

    Brown, Sally

    conservation concern: mitigation - reduce emissions of green house gases Climate Change and Wildlife · Pattern house gases · Secondary concern: adaptation - how do we lessen ongoing impacts of climate change - protect these areas - facilitate animal movement to these areas (corridors) #12;11/30/14 4 Fordham et al

  11. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  12. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  13. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  14. Climate change risk and response

    E-Print Network [OSTI]

    Kahrl, Fredrich; Roland-Holst, David

    2008-01-01

    Climate Change and Electricity Demand: Applying the NewClimate Change and Electricity Demand in California. ”Extreme Heat, and Electricity Demand in California. ”

  15. Climate Change/Paleoclimate & Geochronology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate ChangePaleoclimate & Geochronology "The instrumental record is generally considered not to be long enough to give a complete picture of climate variability... It is...

  16. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  17. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  18. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  19. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  20. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  1. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  2. First Climate formerly Factor Consulting | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban Transport Jump to: navigation, searchSecuritiesClimate formerly

  3. CLIMATE CHANGE WHAT IS CLIMATE CHANGE?

    E-Print Network [OSTI]

    Walter, Frederick M.

    is the global power sector ˇ Generates around 40% of all global electricity from coal ˇ The power sector of Tons of Carbon Dioxide *an estimate from the World Resources Institute STEPS TAKEN TO COMBAT CLIMATE Kullen v. Wild by Nature ˇ WBN is an organic market also owned by King Kullen ˇ Prices nearly doubled

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  6. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  7. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  8. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  9. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  10. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  11. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  13. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  14. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  15. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  16. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  17. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  18. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  19. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  20. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  1. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  2. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  3. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  4. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  5. Climate ChangeClimate Change and Runoff Managementand Runoff Management

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Climate ChangeClimate Change and Runoff Managementand Runoff Management in Wisconsinin Wisconsin NASECA February 3, 2011 David S. Liebl #12;Overview · Understanding climate change · Wisconsin's changing Vegetation indicators #12;Indicators of a changing climate J. Magnuson Source: IPCC 2007 Potter, et al

  6. The role of solar absorption in climate and climate change

    E-Print Network [OSTI]

    1 The role of solar absorption in climate and climate change William Collins UC Berkeley · Changes to surface and atmosphere by aerosols · Climate sensitivity to changes in aerosols and CO2 Research Boulder, Colorado, USA #12;2 Prior Research on Absorption and Climate Field Experiments: · Central

  7. Climate Research in Society 1 CLIMATE SCIENCE IN SOCIETY

    E-Print Network [OSTI]

    von Storch, Hans

    Climate Research in Society 1 CLIMATE SCIENCE IN SOCIETY The situation is post-normal The situation is as follows: Man-made climate change is real, but we are still arguing what it really consists in and how temperature. Restricting emissions will reduce or slow down future climate change. Although everybody agrees

  8. Climate and Sockeye Salmon Climate effects on growth, phenology, and

    E-Print Network [OSTI]

    Hinch, Scott G.

    Climate and Sockeye Salmon Climate effects on growth, phenology, and survival of sockeye salmon in peer-reviewed studies that link sockeye salmon growth, phenology, and survival to climate variables 2. State the known knowledge in regards to effects of climate variables on growth, phenology, and survival

  9. Climate simulators and climate projections Jonathan Rougier1

    E-Print Network [OSTI]

    Dixon, Peter

    Climate simulators and climate projections Jonathan Rougier1 Department of Mathematics University;Abstract We provide a statistical interpretation of current practice in climate mod- elling. This includes: definitions for weather and climate; clarifying the relationship between simulator output and simulator

  10. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  11. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  12. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  13. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  14. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  15. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  16. White House Conference on Global Climate Change

    SciTech Connect (OSTI)

    Not Available

    1993-11-01

    President Clinton has directed the White House office on Environmental Policy to coordinate an interagency process to develop a plan to fulfill the commitment he made in his Earth Day address on April 21, 1993. This plan will become the cornerstone of the Climate Change Plan that will be completed shortly after the Rio Accord enters into force. The Office on Environmental Policy established the Interagency Climate Change Mitigation Group to draw on the expertise of federal agencies including the National Economic Council; the Council of Economic Advisors; the Office of Science and Technology Policy; the Office of Management and Budget; the National Security Council; the Domestic Policy Council; the Environmental Protection Agency; and the Departments of Energy, Transportation, Agriculture, Interior, Treasury, Commerce, and State. Working groups have been established to examine six key policy areas: energy demand, energy supply, joint implementation, methane and other gases, sinks, and transportation. The purpose of the White House Conference on Global Climate Change was to ``tap the real-world experiences`` of diverse participants and seek ideas and information for meeting the President`s goals. During the opening session, senior administration officials defined the challenge ahead and encouraged open and frank conversation about the best possible ways to meet it.

  17. Secure, Efficient Data Transport and Replica Management for High-Performance Data-Intensive Computing_

    E-Print Network [OSTI]

    Chervenak, Ann

    Secure, Efficient Data Transport and Replica Management for High-Performance Data environment, we present the design and initial performance measurements of our GridFTP protocol for efficient- energy physics and climate modeling, we conclude that these applications require two fundamental data

  18. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  19. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  20. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  1. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  2. 1DANGEROUS CLIMATE CHANGE IN BRAZIL Dangerous Climate

    E-Print Network [OSTI]

    1DANGEROUS CLIMATE CHANGE IN BRAZIL Dangerous Climate A BrAzil-UK AnAlysis of ClimAte ChAnge And deforestAtion impACts in the AmAzon Change in Brazil #12;3DANGEROUS CLIMATE CHANGE IN BRAZIL April 2011 Pesquisas Espaciais (INPE), Brazil, and the Met Office Hadley Centre, UK Dangerous Climate A BrAzil-UK An

  3. Campus Climate Survey Binghamton University

    E-Print Network [OSTI]

    Zhang, Zhongfei "Mark"

    1 Campus Climate Survey Binghamton University 2014-15 Office of Diversity, Equity a campus climate that values diversity, equity and inclusion. One of the early tasks of ODEI was to conduct a campus-wide "Campus Climate Survey" to gather a variety of data related to institutional climate

  4. IMPROVING FUTURE CLIMATE PREDICTION USING

    E-Print Network [OSTI]

    Henderson, Gideon

    IMPROVING FUTURE CLIMATE PREDICTION USING PALAEOCLIMATE DATA A community White Paper for consideration by the Natural Environment Research Council, UK #12;#12;IMPROVING FUTURE CLIMATE PREDICTION USING Climate Symposium 2008 - Earth's Climate: Past, Present and Future", convened by H. Elderfield, M. Bickle

  5. Climate and the Tropical Atlantic

    E-Print Network [OSTI]

    Climate and the Tropical Atlantic Presenter: Rick Lumpkin AOML Program Review 4-6 March 2014 What drives Tropical Atlantic climate changes and what are their impacts? #12;AOML Program Review2 Climate and the Tropical Atlantic Why this matters to NOAA and to society: Climate variability in the Tropical Atlantic

  6. Climate risk Learning from practice

    E-Print Network [OSTI]

    Smerdon, Jason E.

    Climate risk management in Africa: Learning from practice ClimateandSocietyNo.1 #12;The Climate and Society series is devoted to providing authoritative and accessible information on climate risk management of the International Research Institute for Climate and Society (IRI). IRI aims to contribute to sustainable living

  7. Climate change: Flawed science, or

    E-Print Network [OSTI]

    Climate change: Fraud, Flawed science, or Fundamental dilemma? Prof Roy Thompson, FRSE #12;Fraud innovation Dilemma... Vicious Circle #12;1. Climate Change - Weather vs. climate - The greenhouse effect - Past climates 2. Impacts - Plants & animals - The seasons 3. Fundamental dilemma - Overpopulation

  8. Information Visualization in Climate Research

    E-Print Network [OSTI]

    Tominski, Christian

    relevant association between time series at vertices · Successes: El-Nino Southern Oscillation, "Climate

  9. Understanding and Attributing Climate Change

    E-Print Network [OSTI]

    Box, Jason E.

    9 Understanding and Attributing Climate Change Coordinating Lead Authors: Gabriele C. Hegerl (USA. Nicholls, J.E. Penner and P.A. Stott, 2007: Under- standing and Attributing Climate Change. In: Climate of the Intergovernmental Panel on Climate Change [Solomon, S., D. Qin, M. Manning, Z. Chen, M. Marquis, K.B. Averyt, M

  10. Biological Impacts of Climate Change

    E-Print Network [OSTI]

    McCarty, John P.

    Biological Impacts of Climate Change John P McCarty, University of Nebraska at Omaha, Omaha, NE and reproduction depend on how well adapted individuals are to local climate patterns. Climate change can disrupt subsequent impacts on populations or species' distributions across geographic regions. Climate change may

  11. Potential Impacts of CLIMATE CHANGE

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Potential Impacts of CLIMATE CHANGE on U.S. Transportation Potential Impacts of CLIMATE CHANGE on U.S. Transportation TRANSPORTATION RESEARCH BOARD SPECIAL REPORT 290 #12;#12;Committee on Climate Change and U Washington, D.C. 2008 www.TRB.org Potential Impacts of CLIMATE CHANGE on U.S. Transportation TRANSPORTATION

  12. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  13. PALEOCLIMATOLOGY Reconstructing Climates of

    E-Print Network [OSTI]

    Briffa, Keith

    recognized as an important source of chronological and climatic information. In Europe, stud- ies of tree growth were facilitated by the availability of wood from archeological sites, as well as from mod- ern

  14. Refining climate models

    ScienceCinema (OSTI)

    Warren, Jeff; Iversen, Colleen; Brooks, Jonathan; Ricciuto, Daniel

    2014-06-26

    Using dogwood trees, Oak Ridge National Laboratory researchers are gaining a better understanding of the role photosynthesis and respiration play in the atmospheric carbon dioxide cycle. Their findings will aid computer modelers in improving the accuracy of climate simulations.

  15. Climate Change Adaptation Planning

    Office of Energy Efficiency and Renewable Energy (EERE)

    This course provides an introduction to planning for climate change impacts, with examples of tribes that have been going through the adaptation planning process. The course is intended for tribal...

  16. Refining climate models

    SciTech Connect (OSTI)

    Warren, Jeff; Iversen, Colleen; Brooks, Jonathan; Ricciuto, Daniel

    2012-10-31

    Using dogwood trees, Oak Ridge National Laboratory researchers are gaining a better understanding of the role photosynthesis and respiration play in the atmospheric carbon dioxide cycle. Their findings will aid computer modelers in improving the accuracy of climate simulations.

  17. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  18. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  19. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  1. Climate policy and dependence on traded carbon

    E-Print Network [OSTI]

    Andrew, Robbie M; Davis, Steven J; Peters, Glen P

    2013-01-01

    three perspectives on energy security: intellectual history,Yergin D 2006 Ensuring energy security Foreign Aff. 85 69–82carbon leakage and mask energy security issues. Keywords:

  2. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    12 a whole on a national level. Some environmental threats such as climate change or solar storms affect all countries simultaneously and therefore have impacts on a global level. Apart from the threat itself, the spread of threat impacts is also... of occurrence reflects more than a heuristic, as in the case of political disruptions or terrorist attacks. And finally threats can be unknown, as in the case of anthropogenic global warming, which was not discovered as a potential risk until its impacts...

  3. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  4. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  5. Geoengineering the Earth's Climate

    ScienceCinema (OSTI)

    Google Tech Talks

    2009-09-01

    Emergency preparedness is generally considered to be a good thing, yet there is no plan regarding what we might do should we be faced with a climate emergency. Such an emergency could take the form of a rapid shift in precipitation patterns, a collapse of the great ice sheets, the imminent triggering of strong climate system feedbacks, or perhaps the loss of valuable ecosystems. Over the past decade, we have used climate models to investigate the potential to reverse some of the effects of greenhouse gases in the atmosphere by deflecting some incoming sunlight back to space. This would probably be most cost-effectively achieved with the placement of small particles in or above the stratosphere. Our model simulations indicate that such geoengineering approaches could potentially bring our climate closer to the state is was in prior to the introduction of greenhouse gases. This talk will present much of what is known about such geoengineering approaches, and raise a range of issues likely to stimulate lively discussion. Speaker: Ken Caldeira Ken Caldeira is a scientist at the Carnegie Institution Department of Global Ecology and a Professor (by courtesy) at the Stanford University Department of Environmental and Earth System Sciences. Previously, he worked for 12 years in the Energy and Environment Directorate at the Lawrence Livermore National Laboratory (Department of Energy). His research interests include the numerical simulation of Earth's climate, carbon, and biogeochemistry; ocean acidification; climate emergency response systems; evaluating approaches to supplying environmentally-friendly energy services; ocean carbon sequestration; long-term evolution of climate and geochemical cycles; and marine biogeochemical cycles. Caldeira has a B.A. in Philosophy from Rutgers College and an M.S. and Ph.D. in Atmospheric Sciences from New York University.

  6. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  7. Climate & Environmental Sciences | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate & Environment SHARE Climate and Environmental Sciences Climate and environmental scientists at ORNL conduct research, develop technology and perform analyses to understand...

  8. Climate & Environmental Sciences | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate and Environment SHARE Climate and Environmental Sciences Climate and environmental scientists at ORNL conduct research, develop technology and perform analyses to...

  9. Climate Change Science Institute | Clean Energy | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate Change Science Institute SHARE Climate Change Science Institute To advance understanding of the Earth system, describe the consequences of climate change, and evaluate and...

  10. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  11. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  12. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  13. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  14. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  15. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  16. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  17. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  18. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  19. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  20. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  1. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  2. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  3. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  4. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  5. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12

  7. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNRELNuclear Security

  8. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOE Office of99SavingTrilateralUnionSecurity

  9. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel MagnetizationTransportationVideos HomePower HomeSecurity

  10. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  11. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  12. taiwan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    taiwan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  14. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  15. Cyber Security | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant,...

  16. hrp | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    hrp | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. sliderphotos | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  18. Trident | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Trident | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  19. Nike | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nike | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  20. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  1. PIA - WEB Physical Security Major Application | Department of...

    Energy Savers [EERE]

    PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PDF icon PIA - WEB Physical Security Major...

  2. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  3. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  4. The National Security Policy Process: The National Security Council and Interagency System

    E-Print Network [OSTI]

    Huang, Wei

    The National Security Policy Process: The National Security Council and Interagency System By Alan Update: August 15, 2011 #12;THIS PAGE INTENTIONALLY BLANK 2 #12;Table of Contents The National Security Policy Process: The National Security Council and Interagency System

  5. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    » Cybercrime and cyberterrorism » Information technology of little use without security 3 #12;GEORGGEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2

  6. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  7. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  8. Computer Security Division 2009 Annual Report

    E-Print Network [OSTI]

    Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

  9. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y. (Rochester, MN)

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  10. Status of Climate Change 

    E-Print Network [OSTI]

    North, G.

    2013-01-01

    stream_source_info ESL-KT-13-12-56.pdf.txt stream_content_type text/plain stream_size 3413 Content-Encoding UTF-8 stream_name ESL-KT-13-12-56.pdf.txt Content-Type text/plain; charset=UTF-8 Status of Climate Change 2013... CaTee Conference San Antonio 2013 ESL-KT-13-12-56 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec. 16-18 Menu for Today • IPCC 2013: Assessment Report #5 • Facts about Climate Change • Who will Win, Who will Lose...

  11. Climate Time-Machine

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D BGene NetworkNuclearDNP 20082 P r o j e c t D eClimateClimate

  12. Climate change cripples forests

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAudits &BradburyMayARM-0501Classroom-presentations SignClimateClimate

  13. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01

    system engineer. A tool is developed to support the steps supporting this methodology and help to bridge the smart metering domain. Copyright © 2013 John Wiley & Sons, Ltd. KEYWORDS model-based engineering; security engineering; security ontology; domain-specific modelling; embedded systems; smart metering

  14. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vendor has issued a fix: 1. Cisco Secure ACS version 5.1: File 5-1-0-44-6.tar.gpg - ACS 5.1.0.44 cumulative patch 6 2. Cisco Secure ACS version 5.2: File...

  15. PRACTICAL SECURITY Implementing Security Education at a Small Community College

    E-Print Network [OSTI]

    Whatcom Community College Abstract: This paper discusses modifying an existing two-year degree to include, and introducing an information security specialty into an existing degree can be challenging. At Whatcom Community ASSURANCE CURRICULUM At the beginning of the 2003-2004 academic year, Whatcom had one security course

  16. www.noaa.gov/climate Proposed Climate Service in NOAA

    E-Print Network [OSTI]

    domestic product depends on accurate weather and climate information. Concerns from business, industry and information about climate that helps people make informed decisions in their lives, businesses, September 2010 Climate Service Example: Construction NOAA provides air-freezing data to the home building

  17. Ensemble climate predictions using climate models and observational constraints

    E-Print Network [OSTI]

    REVIEW Ensemble climate predictions using climate models and observational constraints BY PETER A. STOTT 1,* AND CHRIS E. FOREST 2 1 Hadley Centre for Climate Change (Reading Unit), Meteorology Building, Massachusetts Institute of Technology, Cambridge, MA 02139, USA Two different approaches are described

  18. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  19. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  1. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  2. Global Climate Change and Demand for Energy

    E-Print Network [OSTI]

    Subramanian, Venkat

    1 Global Climate Change and Demand for Energy Tyson Research Center and International Center et al. Climate Variability and Climate Change: The New Climate Dice http://data, 2012 Tyson Research Center International Center for Advanced Research and Sustainability (I

  3. UK Climate Change Risk Assessment and National

    E-Print Network [OSTI]

    Wirosoetisno, Djoko

    UK Climate Change Risk Assessment and National Adaptation Programme Meg Patel Defra #12;Legislative Framework Climate Change Act 2008 Adaptation Reporting Power 2011 Climate Change Risk Assessment: Climate Change Risk Assessment Elevensectors(forinitial analysis) Health Energy Transport Built

  4. Farming: A Climate Change Culprit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Farming: A Climate Change Culprit Farming: A Climate Change Culprit Simulations run at NERSC show impact of land-use change on African monsoon precipitation June 7, 2014 | Tags:...

  5. Climate Change and Urban Trees

    E-Print Network [OSTI]

    Brown, Sally

    Climate Change and Urban Trees: effects on disease and insect pests Drew C. Zwart, Ph.D. Bartlett · Other climate related impacts on plant health: Elevated atmospheric CO2 (no real question about

  6. Climate Extremes, Uncertainty and Impacts Climate Change Challenge: The Fourth Assessment Report of the Intergovernmental Panel on Climate Change

    E-Print Network [OSTI]

    Climate Extremes, Uncertainty and Impacts Climate Change Challenge: The Fourth Assessment Report of the Intergovernmental Panel on Climate Change (IPCC, AR4) has resulted in a wider acceptance of global climate change climate extremes and change impacts. Uncertainties in process studies, climate models, and associated

  7. Risk-driven Security Testing versus Test-driven Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    Risk-driven Security Testing versus Test-driven Security Risk Analysis Gencer Erdogan1 the combinations of se- curity testing and security risk analysis depending on whether it is viewed from a security testing perspective or a security risk analysis perspective. The main focus in the former view is security

  8. GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl MIT Laboratory give a simple proof that GM-security and semantic security are equivalent security no- tions for public security definitions which are still the mostly used ones today. The two notions are called `GM

  9. Information theory and climate prediction 

    E-Print Network [OSTI]

    Leung, Lai-yung

    1988-01-01

    obtained from more sophisticated model. It is amazing that the complicated climate system can be described by such simple energy balance concept. The assumption of homogeneous noise over the sphere is for convenient of calculation and interpretation... in climate prediction study will be demonstrated by using a simple stochastic climate model. Its interpretations and usefulness especially when generalized to other climate models will be discussed and suggestions for using these concepts of information...

  10. 1, 231253, 2005 Synoptic climate

    E-Print Network [OSTI]

    Boyer, Edmond

    CPD 1, 231­253, 2005 Synoptic climate change as driver of New Zealand glaciation H. Rother and J / Esc Print Version Interactive Discussion EGU Climate of the Past Discussions, 1, 231­253, 2005 www.climate-of-the-past.net/cpd/1/231/ SRef-ID: 1814-9359/cpd/2005-1-231 European Geosciences Union Climate of the Past Discussions

  11. Simple Tests of Simple Climate

    E-Print Network [OSTI]

    Withers, Paul

    Simple Tests of Simple Climate Models on More Than One Planet Paul Withers and Ralph Lorenz Spring simple climate models? * Focus on variation with latitude of annually averaged temperatures * Surface * Seasonal effects on Earth * Conclusions #12;Complicated Climate Models * General Circulation Models (GCMs

  12. CLIMATE NETWORKS The Azimuth Project

    E-Print Network [OSTI]

    Baez, John

    CLIMATE NETWORKS The Azimuth Project John Baez, Jan Galkowski, Graham Jones, Nadja Kutz, Daniel: The network of global corporate control #12;In Complex Networks in Climate Dynamics, Donges et al took daily Networks in Climate Dynamics, Donges et al took daily surface air temperatures on a grid and computed

  13. Climate Models and Their Evaluation

    E-Print Network [OSTI]

    Box, Jason E.

    8 Climate Models and Their Evaluation Coordinating Lead Authors: David A. Randall (USA), Richard A and Their Evaluation. In: Climate Change 2007: The Physical Science Basis. Contribution of Working Group I to the Fourth Assessment Report of the Intergovernmental Panel on Climate Change [Solomon, S., D. Qin, M

  14. Climate Modeling and Function Fitting

    E-Print Network [OSTI]

    Blais, Brian

    Climate Modeling and Function Fitting Brown Bag Research Wednesday, October 26, 11 #12;Abstract In this seminar I hope to explore an approach to climate modeling to which I was just introduced, which focusses are those who are interested in any of the topics of time-series analysis, climate modeling , spectrum

  15. Climate Change in Chris Brierley

    E-Print Network [OSTI]

    Jones, Peter JS

    Climate Change in HadCM3 Chris Brierley Chapa Club - 21/06/06 #12;Increase in CO2 A climate forcing References Climate Change SRES Scenarios - T. C. Johns, J. M. Gregory,W. J. Ingram, C. E. Johnson, A. Jones

  16. CLIMATE CHANGE A RISK ASSESSMENT

    E-Print Network [OSTI]

    Cambridge, University of

    CLIMATE CHANGE A RISK ASSESSMENT David King, Daniel Schrag, Zhou Dadi, Qi Ye and Arunabha Ghosh/JAROS, and U.S./JapanASTER Science Team. China National Expert Committee on Climate Change Hosts of the project for Climate Change, and was formerly the UK Government's Chief Scientific Adviser. He has authored over 500

  17. Climate Modeling: A Brief Exploration

    E-Print Network [OSTI]

    Blais, Brian

    Climate Modeling: A Brief Exploration Dr Hong Yang Dr Qin Leng Collin Gagnon April 9, 2014 Dr Brian;Exponential Model Gaussian Model #12;Oscillation Model Ecological Modelling 171 (2004) 433­450 Climate change; accepted 13 August 2003 Abstract Two questions about climate change remain open: detection and attribution

  18. 4, 28752899, 2007 Climate change

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    HESSD 4, 2875­2899, 2007 Climate change impact and model inaccuracy P. Droogers et al. Title Page are under open-access review for the journal Hydrology and Earth System Sciences Climate change impact­2899, 2007 Climate change impact and model inaccuracy P. Droogers et al. Title Page Abstract Introduction

  19. Climate Change Proposed Scoping Plan

    E-Print Network [OSTI]

    Climate Change Proposed Scoping Plan a amework for change Prepared by the California Air Resources #12;CLIMATE CHANGE SCOPING PLAN State of California Air Resources Board Resolution 08-47 December 11 greenhouse gas (GHG) emissions that cause global warming; WHEREAS, the adverse impacts of climate change

  20. Climate Change Action Plan Report

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Climate Change Action Plan Report Intermountain Region 2013 National Park Service Resource Stewardship and Science Landscape Conservation and Climate Change Division #12;About this Report Each National Park Service is responding to the challenge of climate change; and (2) raise awareness among NPS