Powered by Deep Web Technologies
Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

BSL-3 Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Links | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

2

Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > Field Offices > Welcome to the NNSA Production Office > Links Home > Field Offices > Welcome to the NNSA Production Office > Links Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory UCOR Oak Ridge Institute for Science and Education Oak Ridge Site Specific Advisory Board American Museum of Science and Energy City of Oak Ridge Plants Laboratories Bechtel Nevada Bettis Laboratory Kansas City Plant Knolls Atomic Power Laboratory Lawrence Livermore National Laboratory

3

Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Chapter Albuquerque, NM > Links Links "Promoting Equal Opportunity and Cultural Diversity for APAs in Government" FAPAC, Washington DC Printer-friendly version...

4

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Related Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Related Links Related Links NNSA Lab Directed Research and Development (LDRD) Lab Directed Research and Development Collaborations DOE Adanced Scientific Computing Research DTRA (Defense Threat Reduction Agency) NAS (National Academy of Sciences) NSF (National Science Foundation) DOD (Department of Defense) NASA Exascale Activities NNSA Exascale Environment Planning Workshop ASCR Co-Design Centers Supercomputing Top 500 List ASC at Supercomputing Conference Printer-friendly version Printer-friendly version Facebook

5

Demo Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Demo Links | National Nuclear Security Administration Demo Links | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Demo Links Home > About Us > Our Operations > Management and Budget > Human Resources > Pay-banding > Demo Links Demo Links Federal Register Notices July 31, 2008: Federal Register Notice This is a link to a PDF document.

6

EEO Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Links | National Nuclear Security Administration Links | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog EEO Links Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Links EEO Links DOE Office of Civil Rights (weblink) Department Of Justice Civil Rights Division (weblink) Department of Veterans Affairs (weblink)

7

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

8

Pages that link to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Pages that link to "Center for Environment and National Security at Scripps" Center for Environment and National Security...

9

Pages that link to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Pages that link to "Center for Environment and National Security at Scripps Feed" Center for Environment and National...

10

Background Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

11

Office of Security Policy - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Acquisition Regulation (DEAR) 952.204-2 Security Requirements Department of Energy Directives System Guidance for Contracting Officers DoD directive, Access to and Dissemination...

12

EEO Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Jobs Working at NNSA Blog EEO Links Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Links EEO Links DOE Office of Civil Rights (weblink)...

13

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Livermore Field Office > Related Links Related Links NNSA FOIA DOENNSA Telephone Directory U.S. Department of Energy Lawrence Livermore National Laboratory Printer-friendly...

14

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

& Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Related Links Related Links NNSA Lab Directed Research and Development...

15

Homeland Security Presidential Directive 12 - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

16

Background Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Background Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing Institutional Research...

17

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Related Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing Institutional Research...

18

TacNet Tracker - Energy Innovation Portal  

Technology Marketing Summary The TacNet Tracker is designed to transport information securely via portable handheld units without the need for fixed ...

19

V-001: Mozilla Security vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Mozilla Security vulnerabilities 1: Mozilla Security vulnerabilities V-001: Mozilla Security vulnerabilities October 12, 2012 - 6:00am Addthis PROBLEM: Mozilla Security vulnerabilities PLATFORM: Vulnerabilities are reported in Firefox and Thunderbird versions prior to 16.0.1 and SeaMonkey versions prior to 2.13.1. ABSTRACT: Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities REFERENCE LINKS: Secunia Advisory SA50932 Mozilla Security Blog Mozilla Foundation Security Advisory 2012-88 Mozilla Foundation Security Advisory 2012-89 SecurityTracker Alert ID: 1027653 SecurityTracker Alert ID: 1027652 SecurityTracker Alert ID: 1027651 CVE-2012-4190 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 IMPACT ASSESSMENT: High DISCUSSION: 1) The protected "location" object is accessible by other domain objects,

20

Los Alamos lab director to link science education, national security in  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab director to link science education, national security in talk Lab director to link science education, national security in talk Los Alamos lab director to link science education, national security in TEDxABQ talk McMillan will describe the events that led to his career in science and share suggestions on how non-scientists can inspire young people to STEM careers and scientific literacy. September 5, 2013 Los Alamos National Laboratory Director Charlie McMillan Los Alamos National Laboratory Director Charlie McMillan Contact Fred deSousa Communications Office (505) 665-3430 Email "Finding young people with the scientific and technical capabilities to carry on the Laboratory's national security missions will be critical, but the linkage to national security goes beyond that," McMillan said. Watch live stream at home or at Bradbury Science Museum

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Mobile Solar Tracker Facility  

Science Conference Proceedings (OSTI)

Mobile Solar Tracker Facility. ... NIST's mobile solar tracking facility is used to characterize the electrical performance of photovoltaic panels. ...

2011-11-15T23:59:59.000Z

22

RayTracker Inc | Open Energy Information  

Open Energy Info (EERE)

RayTracker Inc RayTracker Inc Jump to: navigation, search Name RayTracker Inc. Place Pasadena, California Zip 91103 Sector Solar Product California-based maker of single-axis solar tracker systems. Coordinates 29.690847°, -95.196308° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":29.690847,"lon":-95.196308,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

23

Project Opportunities Tracker | Open Energy Information  

Open Energy Info (EERE)

Project Opportunities Tracker Project Opportunities Tracker Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Project Opportunities Tracker Agency/Company /Organization: U.S. DOE Energy Efficiency and Renewable Energy Sector: Energy Focus Area: Industry Phase: Evaluate Options Topics: Implementation Resource Type: Dataset User Interface: Website Website: ecenter.ee.doe.gov/EM/tools/Pages/PortfolioToolHome.aspx Country: United States Web Application Link: ecenter.ee.doe.gov/EM/tools/Pages/PortfolioToolHome.aspx Cost: Free OpenEI Keyword(s): Industrial Northern America Language: English The Project Opportunities Tracker provides a central location for viewing, comparing and prioritizing energy-saving projects. It allows users to sort, edit, and save their recommendations from assessments and tools in one

24

SiTracker @ FNAL ROC  

NLE Websites -- All DOE Office Websites (Extended Search)

SiTracker @ FNAL ROC Tracker Standard Operating Procedures Who's Who Shift ELog TIF Data Analysis DCS Using ROOT Running DQM Data Discovery FNAL ROC Shift Operations Process...

25

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security  

Science Conference Proceedings (OSTI)

SCADA (Supervisory Control and Data Acquisition), these are systems based on real-time processing, control and design for real time infrastructure such as water pumping stations, oil purification plants and rail control centers etc. In the initial structure ... Keywords: SCADA attacks, cryptography hybrid algorithm, data flow and distribution, distributed network protocole, hybrid algorithms, prevention system, secure simulation model, security issues, security services, simulation base experimentation and results, supervisory control and data acquisition (SCADA)

Shahrulniza Musa; AAmir Shahzad; Abdulaziz Aborujilah

2013-01-01T23:59:59.000Z

26

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

27

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

28

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. REFERENCE LINKS: Cisco Security Notice CVE-2013-1172 Cisco Security Notice CVE-2013-1173 SecurityTracker Alert ID: 1028425 CVE-2013-1172 CVE-2013-1173 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger a heap overflow in the Cisco Host Scan component to execute arbitrary code on the target system with System privileges

29

T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat May Ignore @ServletSecurity Annotation 0: Apache Tomcat May Ignore @ServletSecurity Annotation Protections T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections March 16, 2011 - 3:05pm Addthis PROBLEM: Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by an error related to ignoring @ServletSecurity annotations. An attacker could exploit this vulnerability to bypass security restrictions and launch further attacks on the system. PLATFORM: Apache Tomcat versions 7.0.0 through 7.0.10. ABSTRACT: Apache Tomcat May Ignore @ServletSecurity Annotation Protections. A remote user may be able to bypass @ServletSecurity annotation protections. reference LINKS: Apache Tomcat Advisory: Apache Tomcat 7.0.11 CVE-2011-1088 Security Tracker Alert ID:1025215 OSVDB ID: 71027

30

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

31

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: Cisco Adaptive Security Appliances Port Forwarder ActiveX 26: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability March 16, 2012 - 7:00am Addthis PROBLEM: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability PLATFORM: Cisco Adaptive Security Appliance (ASA) 7.x, Cisco Adaptive Security Appliance (ASA) 8.x, Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Secunia Advisory SA48422 SecurityTracker Alert ID: 1026799 CVE-2012-0358 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the

32

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

33

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

34

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

35

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

36

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

37

U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Trend Micro InterScan Messaging Security Flaws Permit 3: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks September 19, 2012 - 6:00am Addthis PROBLEM: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: 7.1-Build_Win32_1394; possibly other versions ABSTRACT: A vulnerability was reported in Trend Micro InterScan Messaging Security. reference LINKS: US CERT Vulnerability Note VU#471364 SecurityTracker Alert ID: 1027544 CVE-2012-2995 CVE-2012-2996 Micro Trend IMPACT ASSESSMENT: Medium Discussion: Several scripts do not properly filter HTML code from user-supplied input

38

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

39

U-003:RPM Package Manager security update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03:RPM Package Manager security update 03:RPM Package Manager security update U-003:RPM Package Manager security update October 4, 2011 - 1:30pm Addthis PROBLEM: A vulnerability was reported in RPM Package Manager. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 4.9.1.1 and prior versions. ABSTRACT: RPM Package Manager Header Validation Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: RPM Package Manager Advisory RHSA-2011:1349-1 SecurityTracker Alert ID: 1026134 CVE-2011-3378 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted RPM package that, when queried or installed by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code

40

Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links: Anderson County Government Emergency Management Anderson County Local Emergency Planning Committee (LEPC) City of Oak Ridge Fire Department Knoxville-Knox County Emergency...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links Dedicated links pages are available for the following topics: Diesel Vehicles and Fuels Electric Vehicles Fuel Cell Vehicles Hybrids Plug-in Hybrids Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Auto Manufacturers Acura Aston Martin Audi Bentley BMW Bugatti Buick Cadillac Chevrolet Chrysler Dodge Ferrari Fiat Ford GMC Honda Hyundai Infiniti Jaguar Jeep Kia Lamborghini Land Rover Lexus Lincoln Lotus Maserati Maybach Mazda McLaren Automotive Mercedes-Benz MINI Mitsubishi Nissan Porsche Ram Rolls Royce Roush Performance Scion smart Spyker Subaru Suzuki Toyota Volkswagen Volvo VPG Buying Guides ACEEE's Green Book Aol Autos

42

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

43

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

44

U-011: Cisco Security Response: Cisco TelePresence Video Communication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Security Response: Cisco TelePresence Video 1: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability October 14, 2011 - 12:30pm Addthis PROBLEM: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability PLATFORM: Version(s): VCS prior to 7.0 ABSTRACT: A vulnerability was reported in Cisco TelePresence Video Communication Server. A remote user can conduct cross-site scripting attacks. reference LINKS: Cisco Document ID: 113264 SecurityTracker Alert ID: 1026186 CVE-2011-3294 IMPACT ASSESSMENT: Medium Discussion: A vulnerability exists in Cisco TelePresence Video Communication Server (VCS) due to improper validation of user-controlled input to the web-based

45

Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links Public Outreach Clint Sprott's Wonders of Physics from University of Wisconsin, Madison Clint Sprott's Physics Demo Manual Phun Physics shows from University of Virginia Physics Van from Universitiy of Illinois, Urbana-Champaign How Does A Thing Like That Work from University of Pittsburgh Physics on the Road from Purdue University The Mad Science Group University Catalogues of Demonstrations Boston Univeristy's physics demonstrations University of Victoria physics demonstrations Wesleyan University physics demonstrations University of Minnesota, The Origin of the DCS Physics Demonstrations at the University of Texas at Austin University of Maryland University of Wisconsin University of Guelph University of Oregon Brown Physics Lecture Demonstrations University of California, Berkeley

46

Climate Action Tracker | Open Energy Information  

Open Energy Info (EERE)

Tracker Tracker Jump to: navigation, search Tool Summary Name: Climate Action Tracker Agency/Company /Organization: Ecofys Sector: Climate Topics: GHG inventory, Low emission development planning Resource Type: Guide/manual Website: www.climateactiontracker.org/ Climate Action Tracker Screenshot References: Climate Action Tracker[1] "This "Climate Action Tracker" is an independent science-based assessment, which tracks the emission commitments and actions of countries. The website provides an up-to-date assessment of individual national pledges to reduce their greenhouse gas emissions. In the framework of the UNFCCC, many countries have put proposals on the table about how much they intend to reduce their greenhouse-gas emissions in both the near and the long term.

47

Studies of the CMS tracker at high trigger rate  

E-Print Network (OSTI)

During the latter months of 2006 and the first half of 2007, the CMS Tracker was assembled and operated at the Tracker Integration Facility at CERN. During this period the performance of the tracker at trigger rates up to ...

Chan, M.

48

IrCube tracker: an optical 6-DOF tracker based on LED directivity  

Science Conference Proceedings (OSTI)

Six-degrees-of-freedom (6-DOF) trackers, which were mainly for professional computer applications, are now in demand by everyday consumer applications. With the requirements of consumer electronics in mind, we designed an optical 6-DOF tracker where ... Keywords: LED directivity, ircube, optical 6-DOF tracker, source localization

Seongkook Heo; Jaehyun Han; Sangwon Choi; Seunghwan Lee; Geehyuk Lee; Hyong-Euk Lee; SangHyun Kim; Won-Chul Bang; DoKyoon Kim; ChangYeong Kim

2011-10-01T23:59:59.000Z

49

Oil Price Trackers Inspired by Immune Memory  

E-Print Network (OSTI)

We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

Wilson, WIlliam; Aickelin, Uwe

2010-01-01T23:59:59.000Z

50

Implementation of FracTracker.org  

E-Print Network (OSTI)

Implementation of FracTracker.org: A GeoWeb platform to manage and communicate shale gas slm75@pitt.edu | 412-624-9379 #12;Shale Gas Plays Shale gas plays in the continental U.S. The Marcellus is highlighted in blue. Map created using Data.FracTracker.org. #12;Natural gas drilling in shale

Sibille, Etienne

51

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

52

NOAA's Ship Tracker | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

NOAA's Ship Tracker NOAA's Ship Tracker Ocean Data Tools Technical Guide Map Gallery Regional Planning Feedback Ocean You are here Data.gov » Communities » Ocean » Data NOAA's Ship Tracker Dataset Summary Description NOAA's Ship Tracker is a viewer tool developed by the NOS Special Projects Office (SPO) for the Office of Marine and Aviation Operations (NOAA OMAO) which shows information about the location, present and past, of NOAA's ships. Ship location and the conditions where the ship was located are maintained on this site for one year. The NOAA fleet ranges from large oceanographic research vessels capable of exploring the world's deepest ocean, to smaller ships responsible for charting the shallow bays and inlets of the United States. The fleet supports a wide range of marine activities including fisheries research, nautical charting, and ocean and climate studies.

53

The double-arm barn door tracker  

NLE Websites -- All DOE Office Websites (Extended Search)

How to build a double-arm barn door tracker How to build a double-arm barn door tracker | Jefferson Lab Home Page | Science Education Home Page | Construction Notes/Photos Page | Sources: Sky & Telescope April 1989 (p436 - p441) [very good] Sky & Telescope February 1988 (p213 - p214) Original concept by Dave Trott A single-arm barn door tracker, driven by a straight screw, accumulates tangent error as time passes. Most of this error can be eliminated by adding a second hinged arm to the standard arrangement. There are four types of double-arm trackers, each with a different geometry. A comparison of accumulated error (in arc seconds) and construction parameters is given below: Error Chart [Apparently Type 1 is very bad and not worth constructing?? The two Type 4 drives vary in beta. This results in shifting the region of maximum error

54

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

55

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

56

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

57

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

58

Experimental performance evaluation of line-focus sun trackers  

DOE Green Energy (OSTI)

Two sun trackers have been tested for tracking accuracy on an sun tracker. Both performed well during the entire test period. Their tracking performance as a function of insolation level was established, and their overall tracking accuracy (rms tracking error) was calculated. Both the flux-line and the shadowband tracker were found to have an effective rms error of about 1 milliradian. This information was used to determine the impact that the two trackers have on the annual energy performance of typical parabolic trough concentrating collectors. One milliradian rms tracking errors were found to result in negligibly small annual performance losses.

Gee, R.C.

1982-05-01T23:59:59.000Z

59

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

60

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

62

Do-It-yourself eye tracker: low-cost pupil-based eye tracker for computer graphics applications  

Science Conference Proceedings (OSTI)

Eye tracking technologies offer sophisticated methods for capturing humans' gaze direction but their popularity in multimedia and computer graphics systems is still low. One of the main reasons for this are the high cost of commercial eye trackers that ... Keywords: computer graphics, eye tracker accuracy, eye tracking, human computer interfaces

Rados?aw Mantiuk; Micha? Kowalik; Adam Nowosielski; Bartosz Bazyluk

2012-01-01T23:59:59.000Z

63

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

64

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

65

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

66

Security Policy: Target, Content, & Links  

Science Conference Proceedings (OSTI)

... Sometimes called by its classic term TEMPEST, EMSEC prevents exploiting intercepted electromagnetic energy radiated from equipment that ...

1998-10-28T23:59:59.000Z

67

3D Technology for intelligent trackers  

SciTech Connect

At Super-LHC luminosity it is expected that the standard suite of level 1 triggers for CMS will saturate. Information from the tracker will be needed to reduce trigger rates to satisfy the level 1 bandwidth. Tracking trigger modules which correlate information from closely-spaced sensor layers to form an on-detector momentum filter are being developed by several groups. We report on a trigger module design which utilizes three dimensional integrated circuit technology incorporating chips which are connected both to the top and bottom sensor, providing the ability to filter information locally. A demonstration chip, the VICTR, has been submitted to the Chartered/Tezzaron two-tier 3D run coordinated by Fermilab. We report on the 3D design concept, the status of the VICTR chip and associated sensor integration utilizing oxide bonding.

Lipton, Ronald; /Fermilab

2010-09-01T23:59:59.000Z

68

Frequency Scanned Interferometry for ILC Tracker Alignment  

E-Print Network (OSTI)

In this paper, we report high-precision absolute distance and vibration measurements performed with frequency scanned interferometry. Absolute distance was determined by counting the interference fringes produced while scanning the laser frequency. High-finesse Fabry-Perot interferometers were used to determine frequency changes during scanning. A dual-laser scanning technique was used to cancel drift errors to improve the absolute distance measurement precision. A new dual-channel FSI demonstration system is also presented which is an interim stage toward practical application of multi-channel distance measurement. Under realistic conditions, a precision of 0.3 microns was achieved for an absolute distance of 0.57 meters. A possible optical alignment system for a silicon tracker is also presented.

Hai-Jun Yang; Tianxiang Chen; Keith Riles

2011-09-12T23:59:59.000Z

69

Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness  

Science Conference Proceedings (OSTI)

Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security. Since employees who comply with the information ... Keywords: behavioral issues of information security, compliance, information security awareness, information security management, information security policy, theory of planned behavior

Burcu Bulgurcu; Hasan Cavusoglu; Izak Benbasat

2010-09-01T23:59:59.000Z

70

A Heavy Flavor Tracker for STAR  

Science Conference Proceedings (OSTI)

The STAR Collaboration proposes to construct a state-of-the-art microvertex detector,the Heavy Flavor Tracker (HFT), utilizing active pixel sensors and silicon strip technology. The HFT will significantly extend the physics reach of the STAR experiment for precision measurement of the yields and spectra of particles containing heavy quarks. This will be accomplished through topological identification of D mesons by reconstruction of their displaced decay vertices with a precision of approximately 50 mu m in p+p, d+A, and A+A collisions. The HFT consists of 4 layers of silicon detectors grouped into two sub-systems with different technologies, guaranteeing increasing resolution when tracking from the TPC and the Silicon Strip Detector (SSD) towards the vertex of the collision. The Intermediate Silicon Tracker (IST), consisting of two layers of single-sided strips, is located inside the SSD. Two layers of Silicon Pixel Detector (PIXEL) are inside the IST. The PIXEL detectors have the resolution necessary for a precision measurement of the displaced vertex. The PIXEL detector will use CMOS Active Pixel Sensors (APS), an innovative technology never used before in a collider experiment. The APSsensors are only 50 mu m thick and at a distance of only 2.5 cm from the interaction point. This opens up a new realm of possibilities for physics measurements. In particular, a thin detector (0.28percent radiation length per layer) in STAR makes it possible to do the direct topological reconstruction of open charm hadrons down to very low pT by the identification of the charged daughters of the hadronic decay.

Chasman, C.; Beavis, D.; Debbe, R.; Lee, J.H.; Levine, M.J.; Videbaek, F.; Xu, Z.; Kleinfelder, S.; Li, S.; Cendejas, R.; Huang, H.; Sakai, S.; Whitten, C.; Joseph, J.; Keane, D.; Margetis, S.; Rykov, V.; Zhang, W.M.; Bystersky, M.; Kapitan, J.; Kushpil, V.; Sumbera, M.; Baudot, J.; Hu-Guo, C.; Shabetai, A.; Szelezniak, M.; Winter, M.; Kelsey, J.; Milner, R.; Plesko, M.; Redwine, R.; Simon, F.; Surrow, B.; Van Nieuwenhuizen, G.; Anderssen, E.; Dong, X.; Greiner, L.; Matis, H.S.; Morgan, S.; Ritter, H.G.; Rose, A.; Sichtermann, E.; Singh, R.P.; Stezelberger, T.; Sun, X.; Thomas, J.H.; Tram, V.; Vu, C.; Wieman, H.H.; Xu, N.; Hirsch, A.; Srivastava, B.; Wang, F.; Xie, W.; Bichsel, H.

2008-02-25T23:59:59.000Z

71

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... link to document, the document will open in a blank browser window and this ... USB Flash Drive Security - (Office of Government Ethics), 05/04/06. ...

72

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

73

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

74

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

75

Overview of Progress on the IEC Tracker Design Qualification Standard (Presentation)  

Science Conference Proceedings (OSTI)

An update is given on the IEC WG7's progress to write and publish a tracker design qualification standard.

Muller, M.

2012-03-01T23:59:59.000Z

76

Energy Independence and Security Act of 2007 | Open Energy Information  

Open Energy Info (EERE)

Links Energy Independence and Security Act of 2007 Retrieved from "http:en.openei.orgwindex.php?titleEnergyIndependenceandSecurityActof2007&oldid255460" Category: Stubs...

77

The LHCb Outer Tracker Detector Design and Production  

E-Print Network (OSTI)

The Outer Tracker detector of the LHCb experiment is a gas filled detector based on straw tube technology. It comprises three stations each consisting of multiple layers of wires with both vertical orientation and $pm$5$^{mathbf{o}}$ stereo angles. The stations are designed to be built of modules which are mechanically stable, gas tight and capable of stand-alone operation. This paper describes the design and mass production procedures of Outer Tracker modules and discusses the quality assurance programme. Test results on the first modules produced are included.

Hommels, L B A

2005-01-01T23:59:59.000Z

78

EXTENDED ABSTRACT A Field Computer for Animal Trackers  

E-Print Network (OSTI)

handhelds and compatibles. Our system was initially developed from February 1996 and tested in the Karoo considerable impact. It has been used in four African National Parks: Karoo National Park and Kruger National Hare, Karoo National Park and the trackers, Karel Bernadie, Chocolate Bosch and James Minye

Blake, Edwin

79

Extended abstract a field computer for animal trackers  

Science Conference Proceedings (OSTI)

The field computer system has been developed to gather complex data on amimal behaviour that is observed by expert animal trackers. The system is location aware using the satellite Global Positioning Sytem. The system has been designed to empower semi-literate ... Keywords: context aware, cybertracker, empowerment, location aware, user interface

Edwin H. Blake

2002-04-01T23:59:59.000Z

80

VibroTracker: a vibrotactile sensor tracking objects  

Science Conference Proceedings (OSTI)

Although vibrotactile feedback enlivens virtual interaction, it is difficult to measure actual vibrations of moving objects. Our VibroTracker system achieves this with an optical gaze controller and a laser Doppler vibrometer, enabling users to relive ... Keywords: haptic media, laser doppler vibrometer, tactile sensor, vibrotactile sensation

Leo Miyashita; Yuko Zou; Masatoshi Ishikawa

2013-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

82

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

83

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

84

V-186: Drupal Login Security Module Security Bypass and Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Drupal Login Security Module Security Bypass and Denial of 6: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June 26, 2013 - 1:28am Addthis PROBLEM: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability PLATFORM: Login Security 6.x-1.x versions prior to 6.x-1.2. Login Security 7.x-1.x versions prior to 7.x-1.2. ABSTRACT: A security issue and a vulnerability have been reported in the Login Security module for Drupal REFERENCE LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2013-053 Secunia Advisory SA53717 CVE-2013-2197 CVE-2013-2198 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The security issue is caused due to an unspecified error and can be exploited to bypass the module features. Successful exploitation requires the "soft blocking" feature to be

85

Chaotic iterations versus Spread-spectrum: topological-security and stego-security  

E-Print Network (OSTI)

A new framework for information hiding security, called topological-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks. It has been proven that spread-spectrum techniques, a well-known stego-secure scheme, are topologically-secure too. In this paper, the links between the two notions of security is deepened and the usability of topological-security is clarified, by presenting a novel data hiding scheme that is twice stego and topological-secure. This last scheme has better scores than spread-spectrum when evaluating qualitative and quantitative topological-security properties. Incidentally, this result shows that the new framework for security tends to improve the ability to compare data hiding scheme.

Guyeux, Christophe; Bahi, Jacques M

2011-01-01T23:59:59.000Z

86

ITL Bulletin Security Of Bluetooth Systems And Devices ...  

Science Conference Proceedings (OSTI)

... hopping spread spectrum (FHSS) technology for transmissions. ... but provides for minimal transmission security. ... for radio link power control, which ...

2013-04-16T23:59:59.000Z

87

Cyber Security Awareness Training in the Age of Mobile ...  

Science Conference Proceedings (OSTI)

... Page 24. Property of Titan Info Security Group, LLC ? Instead of clicking on links in email, go to the site like Facebook, LinkedIn, etc. ...

2013-03-28T23:59:59.000Z

88

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube Contact Information | National Nuclear Security Administration Our Mission Managing the Stockpile...

89

Program Requirements | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube Program Requirements | National Nuclear Security Administration Our Mission Managing the Stockpile...

90

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

United States. The partnership of Oak Ridge National Laboratory, the Y-12 National Security Complex and the Savannah River National Laboratory are all tightly linked to the...

91

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

92

Simulated Performance of the GammaTracker CdZnTe Handheld ...  

Simulated Performance of the GammaTracker CdZnTe Handheld Radioisotope Identifier Carolyn E. Seifert, Member, IEEE, Mitchell J. Myjak, Member, IEEE, ...

93

Homeland Security Presidential Directive 12  

NLE Websites -- All DOE Office Websites (Extended Search)

HSPD-12 Home HSPD-12 FAQs About the DOE HSPD-12 Badge HSPD-12 Reporting Metrics for OMB HSPD-12 Implementation Progress Guidance Related Links HSS Logo Homeland Security...

94

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: ModSecurity Multipart Message Parsing Security Bypass 5: ModSecurity Multipart Message Parsing Security Bypass Vulnerability V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability October 18, 2012 - 6:00am Addthis PROBLEM: ModSecurity Multipart Message Parsing Security Bypass Vulnerability PLATFORM: Modsecurity Versions prior to 2.70 ABSTRACT: SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions REFERENCE LINKS: SEC Consult Secunia Advisory SA49853 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when parsing multipart requests and can be exploited to bypass certain filtering rules. IMPACT: Remote Security Bypass SOLUTION: Update to version 2.70. Addthis Related Articles V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities

95

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

96

Energy Citations Database (ECD) - Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their policies may differ from this site....

97

Isotope Identification in the GammaTracker Handheld ...  

National Nuclear Security Administration Office of Nonproliferation Research and Development. PNNL is operated by Battelle Memorial Institute

98

Power Distribution in a CMS Tracker for the SLHC  

E-Print Network (OSTI)

An upgraded tracker for CMS will need a new architecture for powering to keep the power dissipated in the power cables to acceptable levels. Inductor topologies to reduce the stray magnetic field are discussed together with measurements of the magnetic field produced by prototype inductors. A transformer based DC-DC converter has the potential to produce a high stepdown ratio whilst producing a low stray field and retaining high efficiency. The relative merits of buck configuration and transformer based DC-DC converters are discussed.

Cussans, D G; Hill, C

2008-01-01T23:59:59.000Z

99

A Sliding Mode Control for a Sensorless Tracker: Application on a Photovoltaic System  

E-Print Network (OSTI)

The photovoltaic sun tracker allows us to increase the energy production. The sun tracker considered in this study has two degrees of freedom (2-DOF) and especially specified by the lack of sensors. In this way, the tracker will have as a set point the sun position at every second during the day for a period of five years. After sunset, the tracker goes back to the initial position (which of sunrise). The sliding mode control (SMC) will be applied to ensure at best the tracking mechanism and, in another hand, the sliding mode observer will replace the velocity sensor which suffers from a lot of measurement disturbances. Experimental measurements show that this autonomic dual axis Sun Tracker increases the power production by over 40%.

Rhif, Ahmed

2012-01-01T23:59:59.000Z

100

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Techniques for Enhanced Physical-Layer Security  

E-Print Network (OSTI)

Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems. Within this paradigm, we explore strategies to improve secure connectivity in a wireless network. We first consider the intrinsically secure communications graph (iS-graph), a convenient representation of the links that can be established with information-theoretic security on a large-scale network. We then propose and characterize two techniques--sectorized transmission and eavesdropper neutralization--which are shown to dramatically enhance the connectivity of the iS-graph.

Pinto, Pedro C; Win, Moe Z

2010-01-01T23:59:59.000Z

102

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

103

Solar kinetics` photovoltaic concentrator module and tracker development  

DOE Green Energy (OSTI)

Solar Kinetics, Inc., has been developing a point-focus concentrating photovoltaic module and tracker system under contract to Sandia National Laboratories. The primary focus of the contract was to achieve a module design that was manufacturable and passed Sandia`s environmental testing. Nine modules of two variations were assembled, tested, and characterized in Phase 1, and results of these tests were promising, with module efficiency approaching the theoretical limit achievable with the components used. The module efficiency was 11.9% at a solar irradiance of 850 W/m{sup 2} and an extrapolated cell temperature of 25{degrees}C. Improvements in module performance are anticipated as cell efficiencies meet their expectations. A 2-kW tracker and controller accommodating 20 modules was designed, built, installed, and operated at Solar Kinetics` test site. The drive used many commercially available components in an innovative arrangement to reduce cost and increase reliability. Backlash and bearing play were controlled by use of preloaded, low slip-stick, synthetic slide bearings. The controller design used a standard industrial programmable logic controller to perform ephemeris calculations, operate the actuators, and monitor encoders.

White, D.L.; Howell, B. [Solar Kinetics, Inc., Dallas, TX (United States)

1995-11-01T23:59:59.000Z

104

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

105

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

106

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

107

NATO ARW Jun10 CLIMATE SECURITY LINKS (4) SECURITY REFERENCES:  

E-Print Network (OSTI)

Some Some delegations raised doubts regarding Councils s role on the issue, while others, particularly small island states, welcomed Councils consideration

Nobel Peace Prize; Nobel Peace Prize; Peace References

2007-01-01T23:59:59.000Z

108

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

109

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

110

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

111

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

112

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

113

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

114

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

115

DOE Patents Database - Website Policies and Important Links  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their...

116

Technical Design Report for the: PANDA Straw Tube Tracker  

E-Print Network (OSTI)

This document describes the technical layout and the expected performance of the Straw Tube Tracker (STT), the main tracking detector of the PANDA target spectrometer. The STT encloses a Micro-Vertex-Detector (MVD) for the inner tracking and is followed in beam direction by a set of GEM-stations. The tasks of the STT are the measurement of the particle momentum from the reconstructed trajectory and the measurement of the specific energy-loss for a particle identification. Dedicated simulations with full analysis studies of certain proton-antiproton reactions, identified as being benchmark tests for the whole \\Panda scientific program, have been performed to test the STT layout and performance. The results are presented, and the time lines to construct the STT are described.

Erni, W; Krusche, B; Steinacher, M; Heng, Y; Liu, Z; Liu, H; Shen, X; Wang, Q; Xu, H; Aab, A; Albrecht, M; Becker, J; Csap, A; Feldbauer, F; Fink, M; Friedel, P; Heinsius, F H; Held, T; Klask, L; Koch, H; Kopf, B; Leiber, S; Leyhe, M; Motzko, C; Pelizus, M; Pychy, J; Roth, B; Schrder, T; Schulze, J; Sowa, C; Steinke, M; Trifterer, T; Wiedner, U; Zhong, J; Beck, R; Bianco, S; Brinkmann, K T; Hammann, C; Hinterberger, F; Kaiser, D; Kliemt, R; Kube, M; Pitka, A; Quagli, T; Schmidt, C; Schmitz, R; Schnell, R; Thoma, U; Vlasov, P; Walther, D; Wendel, C; Wrschig, T; Zaunick, H G; Bianconi, A; Bragadireanu, M; Caprini, M; Pantea, D; Pantelica, D; Pietreanu, D; Serbina, L; Tarta, P D; Kaplan, D; Fiutowski, T; Idzik, M; Mindur, B; Przyborowski, D; Swientek, K; Czech, B; Kistryn, M; Kliczewski, S; Kozela, A; Kulessa, P; Lebiedowicz, P; Pysz, K; Schfer, W; Siudak, R; Szczurek\\inst, A; Jowzaee, S; Kajetanowicz, M; Kamys, B; Kistryn, S; Korcyl, G; Korcyl, K; Krzemien, W; Magiera, A; Moskal, P; Palka, M; Rudy, Z; Salabura, P; Smyrski, J; Wro?ska\\inst, A; Al-Turany, M; Arora, R; Augustin, I; Deppe, H; Flemming, H; Gerhardt, A; Gtzen, K; Jordi, A F; Kalicy, G; Karabowicz, R; Lehmann, D; Lewandowski, B; Lhning, J; Maas, F; Orth, H; Patsyuk, M; Peters, K; Saito, T; Schepers, G; Schmidt, C J; Schmitt, L; Schwarz, C; Schwiening, J; Traxler, M; Voss, B; Wieczorek, P; Wilms, A; Zhlsdorf\\inst, M; Abazov, V M; Alexeev, G; Arefiev, A; Astakhov, V I; Barabanov, M Yu; Batyunya, B V; Davydov, Yu I; Dodokhov, V Kh; Efremov, A A; Fedunov, A G; Festchenko, A A; Galoyan, A S; Grigoryan, S; Karmokov, A; Koshurnikov, E K; Lobanov, V I; Lobanov, Yu Yu; Makarov, A F; Malinina, L V; Malyshev, V L; Mustafaev, G A; Olshevskiy, A; Pasyuk, M A; Perevalova, E A; Piskun, A A; Pocheptsov, T A; Pontecorvo, G; Rodionov, V K; Rogov, Yu N; Salmin, R A; Samartsev, A G; Sapozhnikov, M G; Shabratova, G S; Skachkova, A N; Skachkov, N B; Strokovsky, E A; Suleimanov, M K; Teshev, R Sh; Tokmenin, V V; Uzhinsky, V V; Vodopyanov, A S; Zaporozhets, S A; Zhuravlev, N I; Zorin, A G; Branford, D; Glazier, D; Watts, D; Woods, P; Britting, A; Eyrich, W; Lehmann, A; Uhlig, F; Dobbs, S; Metreveli, Z; Seth, K; Tomaradze, A; Xiao, T; Bettoni, D; Carassiti, V; Ramusino, A Cotta; Dalpiaz, P; Drago, A; Fioravanti, E; Garzia, I; Savri, M; Stancari, G; Bianchi, N; Gianotti, P; Guaraldo, C; Lucherini, V; Orecchini, D; Pace, E; Bersani, A; Bracco, G; Macri, M; Parodi, R F; Bremer, D; Dormenev, V; Drexler, P; Dren, M; Eissner, T; Fhl, K; Galuska, M; Gessler, T; Hayrapetyan, A; Hu, J; Koch, P; Krck, B; Khn, W; Lange, S; Liang, Y; Merle, O; Metag, V; Moritz, M; Mnchow, D; Nanova, M; Novotny, R; Spruck, B; Stenzel, H; Ullrich, T; Werner, M; Xu, H; Euan, C; Hoek, M; Ireland, D; Keri, T; Montgomery, R; Protopopescu, D; Rosner, G; Seitz, B; Babai, M; Glazenborg-Kluttig, A; Kavatsyuk, M; Lemmens, P; Lindemulder, M; Lhner, H; Messchendorp, J; Moeini, H; Schakel, P; Schreuder, F; Smit, H; Tambave, G; Weele, J C van der; Veenstra\\inst, R; Sohlbach, H; Bscher, M; Deermann, D; Dosdall, R; Esch, S; Gillitzer, A; Goldenbaum, F; Grunwald, D; Henssler, S; Herten, A; Hu, Q; Kemmerling, G; Kleines, H; Kozlov, V; Lehrach, A; Maier, R; Mertens, M; Ohm, H; Orfanitski, S; Prasuhn, D; Randriamalala, T; Ritman, J; Schadmand, S; Serdyuk, V; Sterzenbach, G; Stockmanns, T; Wintz, P; Wstner, P; Xu, H; Kisiel, J; Li, S; Li, Z; Sun, Z; Xu, H; Rigato, V; Fissum, S; Hansen, K; Isaksson, L; Lundin, M; Schrder, B; Achenbach, P; Bleser, S; Cahit, U; Cardinali, M; Denig, A; Distler, M; Fritsch, M; Kangh, D; Karavdina, A; Lauth, W; Merkel, H; Michel, M; Espi, M C Mora; Mller, U; Pochodzalla, J; Prometeusz, J; Sanchez, S; Sanchez-Lorente, A; Schlimme, S; Sfienti, C; Weber\\inst, M Thiel T; Dormenev, V I; Fedorov, A A; Korzhik, M V; Missevitch, O V; Balanutsa, V; Chernetsky, V; Demekhin, A; Dolgolenko, A; Fedorets, P; Gerasimov, A; Goryachev, V; Varentsov, V; Boukharov, A; Malyshev, O; Marishev, I; Semenov, A; Bhmer, F; Drheim, S; Ketzer, B; Paul, S; Hergemller, A K; Khoukaz, A; Khler, E; Tschner, A; Wessels, J; Varma, R; Chaterjee, A; Jha, V; Kailas, S; Roy, B; Yan, Y; Chinorat, K; Khanchai, K; Ayut, L; Pomrad, S; Baldin, E; Kotov, K; Peleganchuk, S; Tikhonov, Yu; Boucher, J; Chambert, V; Dbeyssi, A; Hennino, T; Imre, M; Kunne, R; Galliard, C Le; Ma, B; Marchand, D; Maroni, A; Ong, S; Ramstein, B; Rosier, P; Sudol, M; Tomasi-Gustafsson, E; Wiele, J Van de; Boca, G; Braghieri, A; Costanza, S; Genova, P; Lavezzi, L; Montagna, P; Rotondi, A; Abramov, V; Belikov, N; Davidenko, A; Derevschikov, A; Goncharenko, Y; Grishin, V; Kachanov, V; Konstantinov, D; Kormilitsin, V; Melnik, Y; Levin, A; Minaev, N; Mochalov, V; Morozov, D; Nogach, L; Poslavskiy, S; Ryazantsev, A; Ryzhikov, S; Semenov, P; Shein, I; Uzunian, A; Vasiliev, A; Yakutin, A; Bck, T

2012-01-01T23:59:59.000Z

117

Two-axis tracker for solar panels and the like  

DOE Patents (OSTI)

A tracker including an outer post having elongated bore and a lower end mounted on a sub-structure, an inner pole rotatably received in the elongated bore, a lower bearing in the bore adjacent a lower end of the outer post and attached thereto to be constrained from lateral movement and mounted on the sub-structure such that a lower end of the inner pole rests on and is supported by the lower bearing, an upper bearing near an upper end of the outer post, a circumferential drive supported on the outer post for rotating the inner pole relative to the outer post, such that substantially a full weight of a load on the inner pole is directly transmitted to the sub-structure and lateral force and torque leverage are placed on a full length of the outer post by way of the upper and lower bearing.

Liao, Henry H.

2013-04-16T23:59:59.000Z

118

Bridging language-based and process calculi security  

Science Conference Proceedings (OSTI)

Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising that the literature lacks a comprehensive account of a formal link between ...

Riccardo Focardi; Sabina Rossi; Andrei Sabelfeld

2005-04-01T23:59:59.000Z

119

Office of Security Training Operations - Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Training Operations Please click on this link to go to the National Training Center. Mission The mission of the Office of Security Training Operations is to develop and...

120

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

122

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

123

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in Adobe AcrobatReader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30...

124

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

125

Concern for the Environment | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

link to skip to the main content Facebook Flickr RSS Twitter YouTube Concern for the Environment | National Nuclear Security Administration Our Mission Managing the Stockpile...

126

LANL honors three Laboratory Fellows | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube LANL honors three Laboratory Fellows | National Nuclear Security Administration Our Mission...

127

LANL Conducts Watusi Experiment | National Nuclear Security Administra...  

NLE Websites -- All DOE Office Websites (Extended Search)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube LANL Conducts Watusi Experiment | National Nuclear Security Administration Our Mission Managing the...

128

Environmental Security in Mindanao: a Case for Comprehensive Methods.  

E-Print Network (OSTI)

??This study contributes to the field of environmental security by exploring the causal mechanisms linking environmental degradation and state insecurity. Emphasising these dynamics as they (more)

Ewing, John Jackson

2010-01-01T23:59:59.000Z

129

T-599: Microsoft April 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

99: Microsoft April 2011 Security Bulletin Release 99: Microsoft April 2011 Security Bulletin Release T-599: Microsoft April 2011 Security Bulletin Release April 11, 2011 - 5:24am Addthis PROBLEM: Microsoft April 2011 Security Bulletin Release PLATFORM: Microsoft Windows, Microsoft Office, Microsoft Server Software, and Microsoft Developer Tools and Software ABSTRACT: Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. reference LINKS: Microsoft Security Bulletin Advance Notification for April 2011 Microsoft Security April Affected Software TechNet Webcast: Information About Microsoft April Security Bulletins IMPACT ASSESSMENT: High Discussion:

130

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

131

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

132

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

133

Pages that link to "Geothermal/Land Use" | Open Energy Information  

Open Energy Info (EERE)

for Communities Volume 2 - The Community Energy Plan ( links) Embracing Sustainability in Community Plans ( links) Renewable-Based Energy Secure Communities...

134

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

135

An integrated maximum power point tracker for photovoltaic panels  

E-Print Network (OSTI)

Abstract- This paper proposes a maximum power point tracker (MPPT) for a photovoltaic panel, that is to be integrated with the panel during manufacturing. The MPPT is inexpensive, efficient and has few components that serve to increase the MPPTs mean time between failures (MTBF). The MPPT uses an inexpensive micro-controller to perform all of its functions. This includes maximum power point tracking, series battery voltage regulation, sensorless short circuit protection of the MPPTs converter and intelligent shutdown and wakeup at dusk and dawn. The MPPT can source 10 A to a 6 V- 36 V lead-acid storage battery and can be connected in parallel or series with other MPPTs. The MPPT may be easily configured to perform output voltage regulation on passive and water pumping loads. It could also control the actuation of a diesel generator in a hybrid remote area power supply (RAPS). Energy transfer enhancements of up to 26%, compared to solar panels without MPPTs, have been measured. The complete component and materials cost of the MPPT is approximately 28 % of the cost of photovoltaic panels with a peak power rating of 154 W. The integrated MPPT also consumes no stored energy at night. 1.

Wernher Swiegers

1998-01-01T23:59:59.000Z

136

A Fast Hardware Tracker for the ATLAS Trigger System  

E-Print Network (OSTI)

In hadron collider experiments, triggering the detector to store interesting events for offline analysis is a challenge due to the high rates and multiplicities of particles produced. Maintaining high trigger efficiency for the physics we are most interested in while at the same time suppressing high rate physics from inclusive QCD processes is a difficult but important problem. It is essential that the trigger system be flexible and robust, with sufficient redundancy and operating margin. Providing high quality track reconstruction over the full ATLAS detector by the start of processing at LVL2 is an important element to achieve these needs. As the instantaneous luminosity increases, the computational load on the LVL2 system will significantly increase due to the need for more sophisticated algorithms to suppress backgrounds. The Fast Tracker (FTK) is a proposed upgrade to the ATLAS trigger system. It is designed to enable early rejection of background events and thus leave more LVL2 execution time by moving track reconstruction into a hardware system that takes massively parallel processing to the extreme. The FTK system completes global track reconstruction with near offline resolution shortly after the start of LVL2 processing by rapidly finding and fitting tracks in the inner detector for events passing LVL1 using pattern recognition from a large, pre-computed bank of possible hit patterns. We describe the FTK system design and expected performance in the areas of b-tagging, {\\tau}-tagging, and lepton isolation which play and important role in the ATLAS physics program.

Mark S. Neubauer; for the ATLAS Collaboration

2011-10-10T23:59:59.000Z

137

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

138

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

139

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

140

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

142

Complete Security Framework for Wireless Sensor Networks  

E-Print Network (OSTI)

Security concern for a Sensor Networks and level of security desired may differ according to application specific needs where the sensor networks are deployed. Till now, most of the security solutions proposed for sensor networks are layer wise i.e a particular solution is applicable to single layer itself. So, to integrate them all is a new research challenge. In this paper we took up the challenge and have proposed an integrated comprehensive security framework that will provide security services for all services of sensor network. We have added one extra component i.e. Intelligent Security Agent (ISA) to assess level of security and cross layer interactions. This framework has many components like Intrusion Detection System, Trust Framework, Key Management scheme and Link layer communication protocol. We have also tested it on three different application scenarios in Castalia and Omnet++ simulator.

Sharma, Kalpana; Kuldeep,

2009-01-01T23:59:59.000Z

143

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

144

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

145

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

146

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

147

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

148

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

149

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

150

National Security Science  

NLE Websites -- All DOE Office Websites (Extended Search)

NSS cover - april NSS cover - april Read the April 2013 issue: web | interactive| pdf Skip to Content Skip to Search Skip to Utility Navigation Skip to Top Navigation Skip to Content Navigation Los Alamos National Laboratory submit About | Mission | Business | Newsroom | Phonebook Los Alamos National Laboratory links to site home page Science & Innovation Collaboration Careers, Jobs Community, Environment Science & Innovation Home » Science & Engineering Capabilities Accelerators, Electrodynamics Bioscience, Biosecurity, Health Chemical Science Earth, Space Sciences Energy Engineering High Energy Density Plasmas, Fluids Information Science, Computing, Applied Math Materials Science National Security, Weapons Science Nuclear & Particle Physics, Astrophysics, Cosmology

151

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

152

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

153

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

154

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

155

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

156

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

157

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

158

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

159

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

160

System Integration Issues of DC to DC converters in the sLHC Trackers  

E-Print Network (OSTI)

The upgrade of the trackers at the sLHC experiments requires implementing new powering schemes that will provide an increased power density with reduced losses and material budget. A scheme based on buck and switched capacitors DC to DC converters has been proposed as an optimal solution. The buck converter is based on a power ASIC, connected to a custom made air core inductor. The arrangement of the parts and the board layout of the power module are designed to minimize the emissions of EMI in a compact volume, enabling its integration on the tracker modules and staves.

Allongue, B; Faccio, F; Fuentes, c; Michelisa, S; Orlandia, S

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

The development of high performance online tracker for High Level Trigger of Muon Spectrometer of ALICE  

E-Print Network (OSTI)

The Muon Spectrometer (MS) of the ALICE experiment at LHC is equipped with a HLT (High Level Trigger), whose aim is to improve the accuracy of the trigger cuts delivered at the L0 stage. A computational challenge of real-time event reconstruction is satisfied to achieve this software trigger cut of the HLT. After the description of the online algorithms, the performance of the online tracker is compared with that of the offline tracker using the measured pp collisions at $\\sqrt{s}=7$ TeV.

Indranil Das

2011-05-19T23:59:59.000Z

162

The development of high performance online tracker for High Level Trigger of Muon Spectrometer of ALICE  

E-Print Network (OSTI)

The Muon Spectrometer (MS) of the ALICE experiment at LHC is equipped with a HLT (High Level Trigger), whose aim is to improve the accuracy of the trigger cuts delivered at the L0 stage. A computational challenge of real-time event reconstruction is satisfied to achieve this software trigger cut of the HLT. After the description of the online algorithms, the performance of the online tracker is compared with that of the offline tracker using the measured pp collisions at $\\sqrt{s}=7$ TeV.

Das, Indranil

2011-01-01T23:59:59.000Z

163

Preliminary engineering studies for the support shell of the outer tracker of the SDC detector  

Science Conference Proceedings (OSTI)

The Solenoidal Detector Collaboration (SDC) detector is in the conceptual design phase. ORNL is currently working with various sub-groups on the design of the outer tracker portion of the SDC detector. A major focus in the outer tracker design is the structure that mounts and supports the tracking elements. This structure must meet extreme requirements of alignment and stability while containing a minimum of material. This report describes the requirements, evaluations, and analyses that have been performed on the two options being explored; a cylindrical support shell and a modular support shell.

Vandergriff, D.H.; Mayhall, J.

1991-09-01T23:59:59.000Z

164

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

165

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

166

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

167

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

168

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

169

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

170

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

171

Training Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Courses NERSC Training Accounts Request Form Training Links OSF HPC Seminiars Software Accounts & Allocations Policies Data Analytics & Visualization Science Gateways User Surveys...

172

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

173

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

174

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

175

AFRD - Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links Home Organization Diversity Research Highlights Safety Links Intramural Links Accelerators are built, operated, and used by a large and diverse worldwide community. These links will take you to pages elsewhere that are related to AFRD’ work. The U.S. Department of Energy, Office of Science, is the principal supporter of our activities (and many other R&D endeavors). For information on the Joint Accelerator Conferences go to JACoW. The International Committee for Future Accelerators and the American Physical Society’ Division of Physics of Beams are among the organizations that advance, encourage, and communicate accelerator and beam science. The Laboratory's 50th Anniversary magazine gives an overview of the early and middle history of LBNL. Two of its authors later published the

176

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

177

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

178

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

179

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

180

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Rotation Angle for the Optimum Tracking of One-Axis Trackers  

DOE Green Energy (OSTI)

An equation for the rotation angle for optimum tracking of one-axis trackers is derived along with equations giving the relationships between the rotation angle and the surface tilt and azimuth angles. These equations are useful for improved modeling of the solar radiation available to a collector with tracking constraints and for determining the appropriate motor revolutions for optimum tracking.

Marion, W. F.; Dobos, A. P.

2013-07-01T23:59:59.000Z

182

System Tests with DC-DC Converters for the CMS Silicon Strip Tracker at SLHC  

E-Print Network (OSTI)

The delivery of power is considered to be one of the major challenges for the upgrade of the CMS silicon strip tracker for SLHC. The inevitable increase in granularity and complexity of the device is expected to result in a power consumption comparable or even higher than the power consumption of todays' strip tracker. However, the space available for cables will remain the same. In addition, a further increase of the tracker material budget due to cables and cooling is considered inacceptable, as the performance of the CMS detector must not be compromised for the upgrade. Novel powering schemes such as serial powering or usage of DC-DC converters have been proposed to solve the problem. To test the second option, substructures of the current CMS silicon strip tracker have been operated for the first time with off-the-shelf DC-DC buck converters as well as with first prototypes of custom-designed DC-DC converters. The tests are described and the results are discussed.

Klein, K; Karpinski, W; Merz, J; Sammet, J

2008-01-01T23:59:59.000Z

183

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

184

Security Automation Considered Harmful? W. Keith Edwards Erika Shehan Poole Jennifer Stoll  

E-Print Network (OSTI)

Security Automation Considered Harmful? W. Keith Edwards Erika Shehan Poole Jennifer Stoll School link in information security. Because of this perception, a growing body of research and commercial activity is focused on automated approaches to security. With these approaches, security decisions

Edwards, Keith

185

Diesel Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Diesel Vehicles and Manufacturers Audi A3 (TDI models) A6 (TDI models) A7 (TDI models) A8 L (TDI model) Q5 (TDI models) Q7 (TDI models) BMW 328d Sedan 328d xDrive Sedan 328d xDrive Sports Wagon 535d Sedan 535d xDrive Sedan Chevrolet Cruze Turbo Diesel Jeep Grand Cherokee EcoDiesel Mercedes-Benz E250 BlueTEC GL350 BlueTEC GLK250 BlueTEC ML350 BlueTEC Porsche Cayenne Diesel Volkswagen Beetle (TDI models) Beetle Convertible (TDI models) Golf (TDI models) Jetta (TDI models) Jetta Sportwagen (TDI models) Passat (TDI models) Touareg (TDI models) Diesel-Related Information

186

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

187

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

188

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

189

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

190

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

191

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

192

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

193

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

194

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

195

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

196

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

197

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

198

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

199

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

200

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

202

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

203

Climate-derived tensions in Arctic security.  

Science Conference Proceedings (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

204

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

205

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

206

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Secure Gateway Unspecified Vulnerability 6: Citrix Secure Gateway Unspecified Vulnerability T-566: Citrix Secure Gateway Unspecified Vulnerability February 28, 2011 - 11:22pm Addthis PROBLEM: Citrix Secure Gateway Unspecified Vulnerability. PLATFORM: Citrix Secure Gateway version 3.1.4 ABSTRACT: A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia Advisory SA43497 Citrix Support IMPACT ASSESSMENT: High Discussion: This vulnerability only affects Secure Gateway version 3.1.4. Secure Gateway version 3.2.0 is not affected by this vulnerability, but Citrix recommends that customers currently using this version upgrade their deployments to version 3.2.1 in line with the guidance provided in

207

T-687: Microsoft Security Bulletin Advance Notification for August 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

87: Microsoft Security Bulletin Advance Notification for August 87: Microsoft Security Bulletin Advance Notification for August 2011 T-687: Microsoft Security Bulletin Advance Notification for August 2011 August 8, 2011 - 3:50pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Advance Notification for August 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: An advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. 12 Bulletin updates and two are considered 'Critical'. Impact: This advance notification provides a number as the bulletin identifier,

208

MIDC: Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links Other Data Collection Activities Baseline Surface Radiation Network (BSRN) Clear Sky Forcast for NREL/SRRL (or other locations) Colorado Dept. of Public Health & Environment: Air Quality Index (AQI) Reporting System Colorado State University: USDA UV-B Monitoring and Research Program European Skynet Radiometers network (ESR) Jefferson County, Colorado: Jeffco Weather Station NOAA: Climate Monitoring & Diagnostics Laboratory (CMDL) NREL OTF: Reference Meteorological and Irradiance System (RMIS) NREL RReDC: Cooperative Networks for Renewable Resource Measurements (CONFRRM) NREL RReDC: NASA Remote Sensing Validation Data: Saudi Arabia Rocky Mountain Arsenal (RMA): National Wildlife Refuge Sandia National Laboratories: Photovoltaic Systems Evaluation

209

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

210

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

211

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

212

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

213

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

214

V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue 0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue July 2, 2013 - 12:38am Addthis PROBLEM: ASUS RT-N66U Router AiCloud Security Bypass Security Issue PLATFORM: ASUS RT-N66U Router firmware versions 3.0.0.4.270 and 3.0.0.4.354. ABSTRACT: A security issue in ASUS RT-N66U Router has been reported REFERENCE LINKS: Secunia Advisory SA53931 neohapsis IMPACT ASSESSMENT: Medium DISCUSSION: The security issue is caused due to the device not properly restricting access when processing certain HTTPS requests and can be exploited to gain access to otherwise restricted functionality and e.g. disclose the contents of arbitrary files and directories. Successful exploitation requires the AiCloud web service to be enabled.

215

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

216

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

217

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

218

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

219

Carousel Trackers with 1-Sun or 3-Sun Modules for Commercial Building Rooftops  

Science Conference Proceedings (OSTI)

The goal is lower cost solar electricity. Herein, two evolutional steps are described toward achieving this goal. The first step is to follow the sun with a solar tracker. Herein, a carousel tracker is described for mounting on commercial building flat rooftops in order to produce more kWh per kW relative to fixed PV modules. The second evolutionary improvement is to produce lower cost 3-sun CPV modules where two thirds of the expensive single crystal silicon material is replaced by less expensive mirror material. This paper describes the performance and durability of two prototype installations demonstrating these evolutionary innovations. In the first case, the installation and operation of 2 carousels equipped with traditional flat plate modules is described. In the second case, the operation of a carousel equipped with new 3-sun CPV modules is described. Both systems have been operating as expected for several months through the winter of 2007.

Gehl, Anthony C [ORNL; Maxey, L Curt [ORNL; Fraas, Dr. Lewis [JX Crystals, Inc.; Avery, James E. [JX Crystals, Inc.; Minkin, Leonid M [ORNL; Huang, H, [JX Crystals, Inc.

2008-01-01T23:59:59.000Z

220

Custom DC-DC converters for distributing power in SLHC trackers  

E-Print Network (OSTI)

A power distribution scheme based on the use of on-board DC-DC converters is proposed to efficiently distribute power to the on-detector electronics of SLHC trackers. A comparative analysis of different promising converter topologies is presented, leading to the choice of a magneticbased buck converter as a first conversion stage followed by an on-chip switched capacitors converter. An overall efficiency above 80% is estimated for the practical implementation proposed.

Allongue, B; Blanchot, G; Faccio, F; Fuentes, C; Mattavelli, P; Michelis, S; Orlandis, S; Spiazzi, G

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

222

Study of the B-Meson Lifetime and the Performance of the Outer Tracker at LHCb  

E-Print Network (OSTI)

The research in the dissertation addresses two issues: the overall performance of the LHCb Outer Tracker (OT) detectors as shown during quality checks and beam tests; the study of the lifetimes of B+ and B0 mesons at LHCb. Physics at the Large Hadron Collider (LHC) at CERN, Geneva requires high performance detectors. One of the four major LHC experiments is the Large Hadron Collider beauty experiment (LHCb). It is a dedicated B-physics experiment for precision measurements of CP violation in the B-meson system and for studying rare B decays. In order to efficiently reconstruct the trajectories of charged particles, LHCb is equipped with Outer Tracker (OT), consisting of gaseous straw tube detectors. The OT system comprises three stations each consisting of multiple layers of wires in vertical and non-vertical orientation. Basic unit of the stations is the OT module - a self-contained gas-detector unit filled with a counting gas mixture. The outer tracker module production was carefully monitored by variety of...

Vankov, P

2008-01-01T23:59:59.000Z

223

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

224

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

225

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

226

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

227

STAR (Solenoidal Tracker at RHIC) Figures and Data  

DOE Data Explorer (OSTI)

The primary physics task of STAR is to study the formation and characteristics of the quark-gluon plasma (QGP), a state of matter believed to exist at sufficiently high energy densities. STAR consists of several types of detectors, each specializing in detecting certain types of particles or characterizing their motion. These detectors work together in an advanced data acquisition and subsequent physics analysis that allows final statements to be made about the collision. The STAR Publications page provides access to all published papers by the STAR Collaboration, and many of them have separate links to the figures and data found in or supporting the paper. See also the data-rich summaries of the research at http://www.star.bnl.gov/central/physics/results/. [See also DDE00230

The STAR Collaboration

228

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

229

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

230

LANL honors five Fellows for 2011 | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube LANL honors five Fellows for 2011 | National Nuclear Security Administration Our Mission Managing...

231

US National Nuclear Security Administration NNSA | Open Energy Information  

Open Energy Info (EERE)

Nuclear Security Administration NNSA Nuclear Security Administration NNSA Jump to: navigation, search Name US National Nuclear Security Administration (NNSA) Place Washington, DC Zip 20585 Product Washington D.C.-based nuclear body established by the United States Congress as a separately organized agency within the US Department of Energy. References US National Nuclear Security Administration (NNSA)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. US National Nuclear Security Administration (NNSA) is a company located in Washington, DC . References ↑ "US National Nuclear Security Administration (NNSA)" Retrieved from "http://en.openei.org/w/index.php?title=US_National_Nuclear_Security_Administration_NNSA&oldid=352617

232

T-628: Debian APR Library Security Update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update May 23, 2011 - 3:35pm Addthis PROBLEM: Debian APR Library Security Update. PLATFORM: APR packages: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0 ABSTRACT: A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. reference LINKS: Debian Security Advisory DSA-2237-2 Security Database Adviory Security Focus Advisory CVE-2011-1928 CVE-2011-0419 Secunia Advisory SA44574 IMPACT ASSESSMENT: Medium Discussion: A directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.

233

T-533: Microsoft January 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft January 2011 Security Bulletin Release 3: Microsoft January 2011 Security Bulletin Release T-533: Microsoft January 2011 Security Bulletin Release January 12, 2011 - 2:25pm Addthis PROBLEM: Microsoft January 2011 Security Bulletin Release PLATFORM: Various Windows OS Platforms, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 ABSTRACT: Microsoft released 2 bulletins to address 3 vulnerabilities involving Microsoft Windows and components in Windows OS, and Windows Server Releases. Only 1 of these bulletins get our maximum severity rating of Critical. reference LINKS: Microsoft Security Bulletin Advance Notification for December 2010 TechNet Webcast: Information About Microsoft January 2011 Security Bulletins Discussion: Microsoft Security Bulletin MS11-001 - Important CVE-2010-3145 - This

234

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

235

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

97: Cisco Adaptive Security Appliances Denial of Service 97: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability is caused due to an unspecified error when handling IPv6 transit traffic and can be exploited to cause a reload of the affected device. reference LINKS: Vendor Advisory Secunia ID 49647 CVE-2012-3058 IMPACT ASSESSMENT: High Discussion: Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco

236

Center for Environment and National Security at Scripps | Open Energy  

Open Energy Info (EERE)

National Security at Scripps National Security at Scripps Jump to: navigation, search Logo: Center for Environment and National Security at Scripps Name Center for Environment and National Security at Scripps Place San Diego, California Website http://sio.ucsd.edu/cens/ References CENS - About[1] LinkedIn Connections Contents 1 Overview 2 Headlines 3 Resources 3.1 CENS Programs 3.2 CENS Tools 4 References Overview Center for Environment and National Security at Scripps is an organization based in San Diego, California. "The Center uses the formidable science and research capacity of Scripps Institution of Oceanography to clarify significant environmental impacts on our national security and international human security, thus bringing information to policy makers for the resolution of society's most pressing

237

T-717: Microsoft Security Bulletin Summary for September 2011 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Security Bulletin Summary for September 2011 7: Microsoft Security Bulletin Summary for September 2011 T-717: Microsoft Security Bulletin Summary for September 2011 September 14, 2011 - 9:30am Addthis PROBLEM: Summary of Microsoft security bulletins released on September 13, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Summary for September 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: CVE-2011-1984 - MS11-070 WINS Local Elevation of Privilege Vulnerability CVE-2011-1991 - MS11-071 Windows Components Insecure Library Loading Vulnerability CVE-2011-1986 - MS11-072 Excel Use after Free WriteAV Vulnerability CVE-2011-1987 - MS11-072 Excel Out of Bounds Array Indexing Vulnerability

238

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

239

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

240

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

242

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

243

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

244

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

245

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

246

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

247

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

249

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

250

Is RFID technology secure and private?  

Science Conference Proceedings (OSTI)

Radio Frequency Identification (RFID) has been used in a variety of applications, such as inventory management, anti-theft monitoring of consumer merchandise, and the tagging of livestock. With previous applications, it is difficult to link information ... Keywords: RFID security, backend attacks, middleware attacks, nSpeedPass

Rand A. Mahmood; Wasim A. Al-Hamdani

2011-09-01T23:59:59.000Z

251

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

252

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

253

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

254

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

255

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

256

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

257

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

258

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

259

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

260

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

262

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

263

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

264

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

265

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

266

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

267

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

268

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

269

Hydrogen: Helpful Links & Contacts  

Science Conference Proceedings (OSTI)

Helpful Links & Contacts. Helpful Links. Hydrogen Information, Website. ... Contacts for Commercial Hydrogen Measurement. ...

2013-07-31T23:59:59.000Z

270

ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks  

Science Conference Proceedings (OSTI)

Nodes forward data on behalf of each other in mobile ad hoc networks. In a civilian application, nodes are assumed to be selfish and rational, i.e., they pursue their own self-interest. Hence, the ability to accurately measure traffic forwarding is critical ... Keywords: Anonymity, MANET, Monitoring, Packet forwarding, Secure link layer acknowledgment, Secure reporting protocol, Security

Heesook Choi; William Enck; Jaesheung Shin; Patrick D. Mcdaniel; Thomas F. Porta

2009-05-01T23:59:59.000Z

271

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

272

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

273

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

274

Modeling of decentralized linear observer and tracker for a class of unknown interconnected large-scale sampled-data nonlinear systems with closed-loop decoupling property  

Science Conference Proceedings (OSTI)

A novel low-order modeling of decentralized linear observer-based tracker is presented in this paper for a class of unknown interconnected large-scale sampled-data nonlinear systems with closed-loop decoupling property. The appropriate (low-)order decentralized ... Keywords: Digital redesign, Large-scale system, Observer, Observer/Kalman filter identification, Tracker

Jason Sheng-Hong Tsai; Nien-Tsu Hu; Po-Chuan Yang; Shu-Mei Guo; Leang-San Shieh

2010-08-01T23:59:59.000Z

275

LLiST - a new star tracker camera for tip-tilt correction at IOTA  

E-Print Network (OSTI)

The tip-tilt correction system at the Infrared Optical Telescope Array (IOTA) has been upgraded with a new star tracker camera. The camera features a backside-illuminated CCD chip offering doubled overall quantum efficiency and a four times higher system gain compared to the previous system. Tests carried out to characterize the new system showed a higher system gain with a lower read-out noise electron level. Shorter read-out cycle times now allow to compensate tip-tilt fluctuations so that their error imposed on visibility measurements becomes comparable to, and even smaller than, that of higher-order aberrations.

P. A. Schuller; M. G. Lacasse; D. Lydon; W. H. McGonagle; E. Pedretti; R. K. Reich; F. P. Schloerb; W. A. Traub

2004-08-03T23:59:59.000Z

276

Studies of. mu. prime s underground with the Soudan 2 Tracker  

Science Conference Proceedings (OSTI)

During the period July 1987 through March 1988, a section of the Soudan 2 active shield known as the Tracker' recorded {approximately}250,000 muon tracks. The detector is located in the Tower-Soudan State Park in Soudan, Minnesota USA at a depth of 2090 meters-water equivalent. We have analysed the data collected and searched for time-dependent astronomical sources. Distributions in azimuthal and zenith angles as well as declination and right ascension are shown. 1 ref., 7 figs., 1 tab.

Kochocki, J.; Benjamin, D.; Ewen, B.; Kafka, T.; Mann, A.; McMaster, L.; Milburn, R.; Napier, A.; Oliver, W.; Saitta, B.; Schneps, J.; Sundaralingam, N. (Tufts Univ., Medford, MA (USA)); Allison, W.W.M.; Barr, G.D.; Brooks, C.B.; Cobb, J.H.; Kirby-Gallagher, L.M.; Giles, R.H.; Perkins, D.H.; Shield, P.D.; Thomson, M.A.; West, N. (Oxford Univ. (UK)); Alner, G.J.; Cockerill, D.J.A.; Edwards, V.W.; Garcia-Garcia, C.; Litchf

1989-08-23T23:59:59.000Z

277

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

278

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

279

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

280

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Secure Control Systems for the Energy Sector  

Science Conference Proceedings (OSTI)

Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

Smith, Rhett; Campbell, Jack; Hadley, Mark

2012-03-31T23:59:59.000Z

282

T-584: Microsoft March 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Microsoft March 2011 Security Bulletin Release 84: Microsoft March 2011 Security Bulletin Release T-584: Microsoft March 2011 Security Bulletin Release March 21, 2011 - 4:25pm Addthis PROBLEM: Microsoft March 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms.(Affected Software and Download Locations) ABSTRACT: Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: Microsoft Security Bulletin Summary for March 2011 Microsoft Technical Security Notifications

283

Average Interest Rate for Treasury Securities | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Average Interest Rate for Treasury Securities Average Interest Rate for Treasury Securities Consumer Data Apps Challenges Resources About Blogs Let's Talk Feedback Consumer You are here Data.gov » Communities » Consumer » Data Average Interest Rate for Treasury Securities Dataset Summary Description This dataset shows the average interest rates for U.S Treasury securities for the most recent month compared with the same month of the previous year. The data is broken down by the various marketable and non-marketable securities. The summary page for the data provides links for monthly reports from 2001 through the current year. Average Interest Rates are calculated on the total unmatured interest-bearing debt. The average interest rates for total marketable, total non-marketable and total interest-bearing debt do not include the U.S. Treasury Inflation-Protected Securities.

284

T-724: Microsoft Security Advisory: Fraudulent digital certificates could  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

724: Microsoft Security Advisory: Fraudulent digital certificates 724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing September 22, 2011 - 12:45pm Addthis PROBLEM: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing. PLATFORM: Microsoft Untrusted Certificate Store: DigiNotar root certificates ABSTRACT: Microsoft has released a Microsoft security advisory about this issue for IT professionals. reference LINKS: MS Article ID: 2616676 Microsoft Security Advisory: 2607712 DOE-CIRC Tech Bulletin: T-706 IMPACT ASSESSMENT: Medium Discussion: The Microsoft update revokes the trust of the following DigiNotar root certificates by putting them in the Microsoft Untrusted Certificate Store:

285

T-665: Microsoft Security Bulletin Advance Notification for July 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for July 5: Microsoft Security Bulletin Advance Notification for July 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 July 11, 2011 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2011 PLATFORM: Windows Operating System and Components ABSTRACT: Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: TechNet Webcast Microsoft Security Bulletin Summaries and Webcasts Microsoft Security Bulletin Advance Notification for July 2011

286

T-553: Microsoft February 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Microsoft February 2011 Security Bulletin Release 53: Microsoft February 2011 Security Bulletin Release T-553: Microsoft February 2011 Security Bulletin Release February 9, 2011 - 7:28am Addthis PROBLEM: Microsoft February 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms. (Affected Software and Download Locations) ABSTRACT: Microsoft released 21 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference links: Microsoft Security Bulletin Summary for February 2011 Microsoft Technical Security Notifications

287

Related Sites | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Sites Related Sites Related Sites Links to the following sources of information are provided as resources. Listings are obtained from government, industry and trade organizations and from other resources. B&W Corporate B&W Corporate The Babcock & Wilcox Company is a leading international provider of energy products and services. B&W Lawrence Livermore Lawrence Livermore National Laboratory helps reduce and counter threats to national and global security through the advancement and application of science and technology. B&W Pantex Located in Amarillo, Texas, the Pantex Plant supports stockpile stewardship, nonproliferation, and safeguards and security. Government System for Award Management The System for Award Management (SAM) (formerly Central Contractor

288

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

289

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

290

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

291

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

292

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

293

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

294

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

295

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

296

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

297

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

298

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

299

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

300

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

302

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

303

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

304

Implementation of FracTracker.org: A GeoWeb platform to manage and communicate shale gas information  

E-Print Network (OSTI)

Implementation of FracTracker.org: A GeoWeb platform to manage and communicate shale gas Health, GSPH. Background Natural gas drilling in shale formations worldwide employs relatively new drilling in the Marcellus Shale (See Figure 1.) of the northeastern United States necessitates better

Sibille, Etienne

305

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

306

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

307

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

308

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

309

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

310

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

311

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

312

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

313

Privacy Act Links to Relates Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

on individuals and rules agencies follow to assist individuals who request information about their records. DOE Office of Hearings and Appeals. The Department of Justice...

314

Privacy Act Links to Relates Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Proposed Rules, and Notices of Federal agencies and organizations, as well as Executive Orders and other Presidential Documents. The Privacy Act Issuances Compilation contains...

315

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

316

A combined ultrasonic flow meter and binary vapour mixture analyzer for the ATLAS silicon tracker  

E-Print Network (OSTI)

An upgrade to the ATLAS silicon tracker cooling control system may require a change from C3F8 (octafluoro-propane) evaporative coolant to a blend containing 10-25% of C2F6 (hexafluoro-ethane). Such a change will reduce the evaporation temperature to assure thermal stability following radiation damage accumulated at full LHC luminosity. Central to this upgrade is a new ultrasonic instrument in which sound transit times are continuously measured in opposite directions in flowing gas at known temperature and pressure to deduce the C3F8/C2F6 flow rate and mixture composition. The instrument and its Supervisory, Control and Data Acquisition (SCADA) software are described in this paper. Several geometries for the instrument are in use or under evaluation. An instrument with a pinched axial geometry intended for analysis and measurement of moderate flow rates has demonstrated a mixture resolution of 3.10-3 for C3F8/C2F6 molar mixtures with 20%C2F6, and a flow resolution of 2% of full scale for mass flows up to 30gs-1. In mixtures of widely-differing molecular weight (mw), higher mixture precision is possible: a sensitivity of <5.10-5 to leaks of C3F8 into part of the ATLAS tracker nitrogen envelope (mw difference 160) has been seen. An instrument with an angled sound path geometry has been developed for use at high fluorocarbon mass flow rates of around 1.2 kgs-1 - corresponding to full flow in a new 60kW thermosiphon recirculator under construction for the ATLAS silicon tracker. Extensive computational fluid dynamics studies were performed to determine the preferred geometry (ultrasonic transducer spacing and placement, together with the sound crossing angle with respect to the vapour flow direction). A prototype with 45deg crossing angle has demonstrated a flow resolution of 1.9% of full scale for linear flow velocities up to 15 ms-1. The instrument has many potential applications.

R. Bates; M. Battistin; S. Berry; J. Berthoud; A. Bitadze; P. Bonneau; J. Botelho-Direito; N. Bousson; G. Boyd; G. Bozza; E. Da Riva; C. Degeorge; B. DiGirolamo; M. Doubek; D. Giugni; J. Godlewski; G. Hallewell; S. Katunin; D. Lombard; M. Mathieu; S. McMahon; K. Nagai; E. Perez-Rodriguez; C. Rossi; A. Rozanov; V. Vacek; M. Vitek; L. Zwalinski

2012-10-17T23:59:59.000Z

317

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

318

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

319

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

320

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

322

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

323

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

324

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

325

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

326

The Vertex Tracker at the e+e- Linear Collider Conceptual Design, Detector R&D and Physics Performances for the Next Generation of Silicon Vertex Detectors  

E-Print Network (OSTI)

The e+e- linear collider physics programme sets highly demanding requirements on the accurate determination of charged particle trajectories close to their production point. A new generation of Vertex Trackers, based on different technologies of high resolution silicon sensors, is being developed to provide the needed performances. These developments are based on the experience with the LEP/SLC vertex detectors and on the results of the R&D programs for the LHC trackers and also define a further program of R&D specific to the linear collider applications. In this paper the present status of the conceptual tracker design, silicon detector R&D and physics studies is discussed.

Marco Battaglia; Massimo Caccia

1999-11-26T23:59:59.000Z

327

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

328

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

329

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

330

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

331

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

332

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

333

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

334

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

335

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

336

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

337

Contact Us | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Us Contact Us Home > Field Offices > Welcome to the Los Alamos Field Office > Contact Us Contact Us Contact the NNSA Los Alamos Field Office NNSA Los Alamos Field Office (NA-00-LA) 3747 West Jemez Road Los Alamos, NM 87544 (505) 667-6691 Please send any comments, questions, or feedback to Toni Chiri Featured Links LANL Phonebook National Nuclear Security Administration Los Alamos National Laboratory Los Alamos County USA Gov Department of Energy (DOE) New Mexico Environmental Department - LANL U.S. Department of Homeland Security Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program LANS Contract Los Alamos Field Office Emergency Public Information Related Links

338

Grant Application Process | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Grant Application Process | National Nuclear Security Administration Grant Application Process | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Grant Application Process Home > Grant Application Process Grant Application Process Please visit www.grants.gov off site link to find out more about the grant application process. At www.grants.gov off site link you can find

339

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

340

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

The Detector Control Unit An ASIC for the monitoring of the CMS silicon tracker  

E-Print Network (OSTI)

The Detector Control Unit (DCU) is an ASIC developed as the central building block of a monitoring system for the CMS Tracker. Leakage currents in the Silicon detectors, power supply voltages of the readout electronics and local temperatures will be monitored in order to guarantee safe operating conditions during the 10-years lifetime in the LHC environment. All these measurements can be performed by an A/D converter preceded by an analog multiplexer and properly interfaced to the central control system. The requirements in terms of radiation tolerance, low-power dissipation and integration with the rest of the system led to the design of a custom integrated circuit. Its structure and characteristics are described in this paper. (6 refs).

Magazz, G; Moreira, P

2004-01-01T23:59:59.000Z

342

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

343

An on-line acoustic fluorocarbon coolant mixture analyzer for the ATLAS silicon tracker  

SciTech Connect

The ATLAS silicon tracker community foresees an upgrade from the present octafluoro-propane (C{sub 3}F{sub 8}) evaporative cooling fluid - to a composite fluid with a probable 10-20% admixture of hexafluoro-ethane (C{sub 2}F{sub 6}). Such a fluid will allow a lower evaporation temperature and will afford the tracker silicon substrates a better safety margin against leakage current-induced thermal runaway caused by cumulative radiation damage as the luminosity profile at the CERN Large Hadron Collider increases. Central to the use of this new fluid is a new custom-developed speed-of-sound instrument for continuous real-time measurement of the C{sub 3}F{sub 8}/C{sub 2}F{sub 6} mixture ratio and flow. An acoustic vapour mixture analyzer/flow meter with new custom electronics allowing ultrasonic frequency transmission through gas mixtures has been developed for this application. Synchronous with the emission of an ultrasound 'chirp' from an acoustic transmitter, a fast readout clock (40 MHz) is started. The clock is stopped on receipt of an above threshold sound pulse at the receiver. Sound is alternately transmitted parallel and anti-parallel with the vapour flow for volume flow measurement from transducers that can serve as acoustic transmitters or receivers. In the development version, continuous real-time measurement of C{sub 3}F{sub 8}/C{sub 2}F{sub 6} flow and calculation of the mixture ratio is performed within a graphical user interface developed in PVSS-II, the Supervisory, Control and Data Acquisition standard chosen for LHC and its experiments at CERN. The described instrument has numerous potential applications - including refrigerant leak detection, the analysis of hydrocarbons, vapour mixtures for semiconductor manufacture and anesthetic gas mixtures. (authors)

Bates, R. [Dept. of Physics and Astronomy, Univ. of Glasgow, G12 8QQ (United Kingdom); Battistin, M. [CERN, 1211 Geneva 23 (Switzerland); Berry, S.; Bitadze, A. [Dept. of Physics and Astronomy, Univ. of Glasgow, G12 8QQ (United Kingdom); Bonneau, P. [CERN, 1211 Geneva 23 (Switzerland); Bousson, N. [Centre de Physique des Particules de Marseille, 163 Avenue de Luminy, 13288 Marseille Cedex 09 (France); Boyd, G. [Dept. of Physics and Astronomy, Univ. of Oklahoma, Norman, OK 73019 (United States); Botelho-Direito, J.; DiGirolamo, B. [CERN, 1211 Geneva 23 (Switzerland); Doubek, M. [Czech Technical Univ., Technicka 4, 166 07 Prague 6 (Czech Republic); Egorov, K. [Physics Dept., Indiana Univ., Bloomington, IN 47405 (United States); Godlewski, J. [CERN, 1211 Geneva 23 (Switzerland); Hallewell, G. [Centre de Physique des Particules de Marseille, 163 Avenue de Luminy, 13288 Marseille Cedex 09 (France); Katunin, S. [B.P. Konstantinov Petersburg Nuclear Physics Inst. PNPI, 188300 St. Petersburg (Russian Federation); Mathieu, M.; McMahon, S. [Rutherford Appelton Laboratory - Science and Technology Facilities Council, Chilton, Didcot OX11 OQX (United Kingdom); Nagai, K. [Graduate School of Pure and Applied Sciences, Univ. of Tsukuba, 1-1-1 Tennodai, Tsukuba, Ibaraki 305-8577 (Japan); Perez-Rodriguez, E. [CERN, 1211 Geneva 23 (Switzerland); Rozanov, A. [Centre de Physique des Particules de Marseille, 163 Avenue de Luminy, 13288 Marseille Cedex 09 (France); Vacek, V.; Vitek, M. [Czech Technical Univ., Technicka 4, 166 07 Prague 6 (Czech Republic)

2011-07-01T23:59:59.000Z

344

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

345

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

346

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

347

Frequently Used Forms and Links | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Safeguards & Security Safeguards & Security » Frequently Used Forms and Links Safety, Security and Infrastructure (SSI) SSI Home Facilities and Infrastructure Safeguards & Security Frequently Used Forms and Links Environment, Safety and Health (ES&H) Organization Chart .pdf file (82KB) Phone Listing .pdf file (129KB) SC HQ Continuity of Operations (COOP) Implementation Plan .pdf file (307KB) Categorical Exclusion Determinations SLI & SS Budget Contact Information Safety, Security and Infrastructure U.S. Department of Energy SC-31/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-4097 F: (301) 903-7047 Safeguards & Security Frequently Used Forms and Links Print Text Size: A A A RSS Feeds FeedbackShare Page Frequently Used Forms Badging DOE F 206.4 - Information Sheet for Sponsorship of HSPD-12 Credential

348

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

349

Renewable-Based Energy Secure Communities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities U.S. Department of Energy (DOE) Community Renewable Energy Deployment (CommRE) projects receive financial assistance and support from numerous federal and state agencies and partnering organizations. The University of California at Davis CommRE project is not only being funded by DOE, but also by the California Energy Commission's (CEC) Renewable-Based Energy Secure Communities (RESCO) program. Below are summaries of select RESCO projects and links to additional information. About Renewable-Based Energy Secure Communities RESCO projects are funded by the CEC's Public Interest Energy Research (PIER) Program, which supports public interest energy research, development, and demonstration. The goal of RESCO is to develop and

350

V-008: Debian Security Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Debian Security Advisory 8: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze8. IMPACT: Debian has issued an update for bind9. This fixes a vulnerability, which

351

Homeland Security | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Homeland Security High Energy Physics (HEP) HEP Home About Research Facilities Science Highlights Benefits of HEP Medicine Homeland Security Industry Computing Sciences Workforce Development A Growing List Accelerators for Americas Future External link Funding Opportunities Advisory Committees News & Resources Contact Information High Energy Physics U.S. Department of Energy SC-25/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: sc.hep@science.doe.gov More Information » Benefits of HEP Homeland Security Print Text Size: A A A RSS Feeds FeedbackShare Page Homeland security: monitoring nuclear nonproliferation In nuclear reactors, the amount of plutonium builds up as the uranium fuel is used, and the number and characteristics of antineutrinos emitted by

352

V-008: Debian Security Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Debian Security Advisory 08: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze8. IMPACT: Debian has issued an update for bind9. This fixes a vulnerability, which

353

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

354

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

355

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

356

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

357

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

358

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

359

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

360

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

362

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

363

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Cisco IronPort Web / Email Security Appliance Sophos 21: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

364

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco IronPort Web / Email Security Appliance Sophos 1: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

365

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

366

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

367

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

368

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

369

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

370

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

371

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

372

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

373

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

374

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

375

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

376

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

377

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

378

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

379

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

380

NEWTON's Weather Links  

NLE Websites -- All DOE Office Websites (Extended Search)

References Do you have a great weather reference link? Please click our Ideas page. Featured Reference Links: NOAA Teachers Support Page NOAA Teachers Support Page for Weather and...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

382

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

383

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

384

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

385

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

386

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

387

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

388

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

389

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

390

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI für Informatik Univ. Tübingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

391

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

392

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

393

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

394

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

395

Comparison of Routable Control System Security Approaches  

SciTech Connect

This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

2011-06-01T23:59:59.000Z

396

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

397

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

398

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

399

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

400

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

402

Design, construction and commissioning of the Thermal Screen Control System for the CMS Tracker detector at CERN  

E-Print Network (OSTI)

The CERN (European Organization for Nuclear Research) laboratory is currently building the Large Hadron Collider (LHC). Four international collaborations have designed (and are now constructing) detectors able to exploit the physics potential of this collider. Among them is the Compact Muon Solenoid (CMS), a general purpose detector optimized for the search of Higgs boson and for physics beyond the Standard Model of fundamental interactions between elementary particles. This thesis presents, in particular, the design, construction, commissioning and test of the control system for a screen that provides a thermal separation between the Tracker and ECAL (Electromagnetic CALorimeter) detector of CMS (Compact Muon Solenoid experiment). Chapter 1 introduces the new challenges posed by these installations and deals, more in detail, with the Tracker detector of CMS. The size of current experiments for high energy physics is comparable to that of a small industrial plant: therefore, the techniques used for controls a...

Carrone, E; Tsirou, A

403

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

404

Test report on the Abacus 30 kW bimode{reg_sign} inverter and maximum power tracker (MPT)  

DOE Green Energy (OSTI)

Sandia National Laboratories conducts the photovoltaic balance of systems (BOS) program, which is sponsored by the US Department of Energy`s Office of Energy Management. Under this program, SNL lets commercialization contracts and conducts a laboratory program designed to advance BOS technology, improve BOS component reliability, and reduce the BOS life-cycle-cost. This report details the testing of the first large US manufactured hybrid inverter and its associated maximum power tracker.

Bonn, R.; Ginn, J.; Zirzow, J. [and others

1995-06-01T23:59:59.000Z

405

Secure Smart Environments: Security Requirements, Challenges and Experiences in Pervasive Computing  

E-Print Network (OSTI)

INTRODUCTION In an ideal pervasive computing environment, a large number of connected smart devices are deployed to collaboratively provision seamless services to users. Pervasive computing is enabled by various advanced technologies, particularly wireless technologies and the Internet. It has become a trend for our future lives. A pervasive computing environment can be extremely heterogeneous. We can imagine how many different devices are involved in a smart home: TVs, phones, cameras, coffee makers, or even books and bookshelves. Since these devices are smart and communicate with each other mainly via wireless links, security must be ensured. Otherwise, the smart devices deployed around us would come back to hunt us and the result would be catastrophic. In this abstract we briefly discuss some important security issues in pervasive computing. II. SECURITY CHALLENGES AND REQUIREMENTS IN PERVASIVE COMPUTING:THE BIG PICTURE Due to the very high heterogeneity and complexity of pervasi

Jun Wang; Yaling Yang; William Yurcik

2005-01-01T23:59:59.000Z

406

PIPELINES AS COMMUNICATION NETWORK LINKS  

SciTech Connect

This report presents the results of an investigation into two methods of using the natural gas pipeline as a communication medium. The work addressed the need to develop secure system monitoring and control techniques between the field and control centers and to robotic devices in the pipeline. In the first method, the pipeline was treated as a microwave waveguide. In the second method, the pipe was treated as a leaky feeder or a multi-ground neutral and the signal was directly injected onto the metal pipe. These methods were tested on existing pipeline loops at UMR and Batelle. The results reported in this report indicate the feasibility of both methods. In addition, a few suitable communication link protocols for this network were analyzed.

Kelvin T. Erickson; Ann Miller; E. Keith Stanek; C.H. Wu; Shari Dunn-Norman

2005-03-14T23:59:59.000Z

407

U-009:Microsoft Security Bulletin Summary for October 2011 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09:Microsoft Security Bulletin Summary for October 2011 09:Microsoft Security Bulletin Summary for October 2011 U-009:Microsoft Security Bulletin Summary for October 2011 October 12, 2011 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Summary for October 2011 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2. ABSTRACT: Microsoft released 8 bulletins to address vulnerabilities. This Microsoft bulletin contains 2 critical vulnerabilities. reference LINKS: Microsoft Security Bulletin Summary for October 2011 Security Bulletin Summary October Archive IMPACT ASSESSMENT: High Discussion: For more details regarding the Microsoft October 2011 bulletins, please see follow link for CVE details. You can find more information located under the "Affected Software and Download Locations" section using the following

408

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

409

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

First Analysis Securities Corporation First Analysis Securities Corporation Jump to: navigation, search Logo: First Analysis Securities Corporation Name First Analysis Securities Corporation Address One South Wacker Drive, Suite 3900 Place Chicago, Illinois Zip 60606 Product Private equity, venture capital, investment banking and equity research. Year founded 1981 Phone number (312) 258-1400 Website http://www.firstanalysis.com/ Coordinates 41.8819019°, -87.6367295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.8819019,"lon":-87.6367295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

410

A systematic review of security requirements engineering  

Science Conference Proceedings (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

411

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

412

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

413

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

414

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

415

PROPOSAL FOR A SILICON VERTEX TRACKER (VTX) FOR THE PHENIX EXPERIMENT  

Science Conference Proceedings (OSTI)

We propose the construction of a Silicon Vertex Tracker (VTX) for the PHENIX experiment at RHIC. The VTX will substantially enhance the physics capabilities of the PHENIX central arm spectrometers. Our prime motivation is to provide precision measurements of heavy-quark production (charm and beauty) in A+A, p(d)+A, and polarized p+p collisions. These are key measurements for the future RHIC program, both for the heavy ion program as it moves from the discovery phase towards detailed investigation of the properties of the dense nuclear medium created in heavy ion collisions, and for the exploration of the nucleon spin-structure functions. In addition, the VTX will also considerably improve other measurements with PHENIX. The main physics topics addressed by the VTX are: (1) Hot and dense strongly interacting matter--(a) Potential enhancement of charm production, (b) Open beauty production, (c) Flavor dependence of jet quenching and QCD energy loss, (d) Accurate charm reference for quarkonium, (e) Thermal dilepton radiation, (f) High p{sub T} phenomena with light flavors above 10-15 GeV/c in p{sub T}, and (g) Upsilon spectroscopy in the e{sup +}e{sup -} decay channel. (2) Gluon spin structure of the nucleon--(a) {Delta}G/G with charm, (b) {Delta}G/G with beauty, and (c) x dependence of {Delta}G/G with {gamma}-jet correlations. (3) Nucleon structure in nuclei--Gluon shadowing over broad x-range.

AKIBA,Y.

2004-10-01T23:59:59.000Z

416

Front-end software for the D-Zero silicon tracker  

SciTech Connect

Fermilab's D0 experiment is constructing a new silicon microstrip detector as part of its upgrade detector. This will have nearly 800,000 instrumented channels and combined with the rest of the tracker accounts for nearly one million channels. Being able to monitor, calibrate, and diagnose problems with this many channels is a daunting challenge. We propose to use distributed processors to ''spy'' on the data as it is collected. These processors will be resident in the VME data acquisition crates and will be able to access the data over either VME or a secondary bus which is independent of the main data acquisition path. The processing of the monitor data will take place in these local processors. Communication with the online cluster will be over ethernet and will employ a graphical interface for user control. The design uses a client/server architecture in this network of processors. We describe the software and hardware which has been tested as part of the verification of this desig n.

NONE

1997-01-01T23:59:59.000Z

417

The heart of ATLAS Commissioning and performance of the ATLAS silicon tracker  

E-Print Network (OSTI)

The Large Hadron Collider (LHC) has been built under the french-swiss border near Geneva, Switzerland. Two opposing beams of protons will collide with a centre of mass energy of 14 TeV, an energy seven million times that of the first accelerator. The LHC takes particle physics research to a new frontier. On September 10th 2008, the first single pilot beam of $2 x 10^9$ protons was circulated successfully through the entire LHC, with an injection energy of 0.45 TeV. The first collisions are expected in Summer 2009. One of the experiments designed to search for new particle phenomena is the ATLAS experiment. This is a general purpose detector capable of detecting and measuring the broadest range of particle signals. At the heart of the ATLAS detector lies the SemiConductor Tracker (SCT). It is a central part of the inner detector providing precision measurements of particle trajectories over a large $\\eta$ range. The work presented in this thesis focuses on the performance and commissioning of the SCT detector....

Magrath, Caroline Alexandra

2009-01-01T23:59:59.000Z

418

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

419

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

420

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

422

Enforcement Regulations and Directives - Security | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Regulations and Directives - Security Classified Information Security 10 C.F.R Part 824 - Procedural Rules for the Assessment of Civil Penalties for Classified...

423

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

424

Lemnos Interoperable Security Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Program More Documents & Publications SECURITY CORE FUNCTION AND DEFINITION REPORT Lemnos Interoperable Security DOE National SCADA Test Bed Program Multi-Year Plan...

425

Security Orchestration with IF-MAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 7. ...

2012-10-26T23:59:59.000Z

426

Office of Headquarters Security Operations - Headquarters Facilities...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations HomeIntroduction Physical Security Limited Areas and Vault-Type Rooms Personnel Security Foreign Ownership, Control or Influence; Facility...

427

DOE Headquarters Security Quick Reference Book | Navigation  

NLE Websites -- All DOE Office Websites (Extended Search)

TECH. & INFO. SECURITY TEAM HOME COVER | INTRODUCTION SECURITY ACRONYMS TABLE OF CONTENTS HEADQUARTERS SECURITY OFFICER PROTECTIVE FORCE UNCLASSIFIED FOREIGN VISITS & ASSIGNMENTS...

428

Office of Headquarters Security Operations: Headquarters Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

429

Office of Security Operations: Director's Message  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Home Sub Offices HQ Security Officers (HSO) Program Office of Security Operations Office of Information Security Office of...

430

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

431

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

9.2.2 Security Interdependence . . . . . . Bounded Control7 Security Constrained Networked Control 7.1Inputs 9 Security Interdependencies for Networked 9.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

432

Global Environmental Change and Human Security  

E-Print Network (OSTI)

with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

Kunnas, Jan

2011-01-01T23:59:59.000Z

433

National Security & Safety Reports | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security & Safety Reports National Security & Safety Reports October 29, 2013 Evaluation Report: IG-0897 The Department of Energy's Unclassified Cyber Security Program -...

434

Security and Performance Considerations in Wireless Networks  

E-Print Network (OSTI)

ACM Workshop on Wireless Security, 2004. [3] ISM Wide-bandTraffic Flows. In Network Security Lab (NSL) Technicalthe Challenges of Security in a Mobile Environment. In

Pelechrinis, Konstantinos

2010-01-01T23:59:59.000Z

435

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

436

Security and United States Immigration Policy  

E-Print Network (OSTI)

Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

Totten, Robbie James

2012-01-01T23:59:59.000Z

437

Visitor_Security_and_Safety_Information  

NLE Websites -- All DOE Office Websites (Extended Search)

in a designated lot near the main lobby and auditorium. Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations United...

438

Security, Emergency Planning & Safety Records | Department of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

439

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

440

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations  

Science Conference Proceedings (OSTI)

China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization ... Keywords: China, Cyber-security, Cyber-security related alliances, Cybercrime, International relations, International trade, Intrinsic and extrinsic motivations

Nir Kshetri

2013-03-01T23:59:59.000Z

442

Games, Risks, and Analytics: Several Illustrative Cases Involving National Security and Management Situations  

Science Conference Proceedings (OSTI)

This paper presents and compares four models of games and risk analyses designed to support strategic and policy decisions, three focusing on national security issues and one on project management. They share a common core of probability, linked decisions ... Keywords: analytics, counterterrorism, failure probability, game analysis, national security, nuclear proliferation, practice, principal--agent model, risk analysis

M. Elisabeth Pat-Cornell

2012-06-01T23:59:59.000Z

443

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

444

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

445

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

446

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Mithra...

447

Pages that link to "Property:UNRegion" | Open Energy Information  

Open Energy Info (EERE)

( links) Mauritius ( links) Bahrain ( links) Moldova ( links) Thailand ( links) Portugal ( links) Sudan ( links) View (previous 50 |...

448

Pages that link to "Form:Tool" | Open Energy Information  

Open Energy Info (EERE)

( links) Mauritius ( links) Bahrain ( links) Moldova ( links) Thailand ( links) Portugal ( links) Sudan ( links) Senegal (...

449

Pages that link to "Form:Research Institution" | Open Energy...  

Open Energy Info (EERE)

( links) Mauritius ( links) Bahrain ( links) Moldova ( links) Thailand ( links) Portugal ( links) Sudan ( links) Senegal (...

450

Pages that link to "Form:Program" | Open Energy Information  

Open Energy Info (EERE)

( links) Mauritius ( links) Bahrain ( links) Moldova ( links) Thailand ( links) Portugal ( links) Sudan ( links) Senegal (...

451

Pages that link to "Form:Company" | Open Energy Information  

Open Energy Info (EERE)

( links) Mauritius ( links) Bahrain ( links) Moldova ( links) Thailand ( links) Portugal ( links) Sudan ( links) View (previous 50 |...

452

An Introduction to Computer Security: the NIST Handbook  

Science Conference Proceedings (OSTI)

An Introduction to Computer Security: the NIST Handbook Keywords: computer security, contingency planning, cryptography, guidance, information assurance, risk management, security audit, security controls, security policy

Barbara Guttman; Edward A. Roback

1995-10-01T23:59:59.000Z

453

U-234: Oracle MySQL User Login Security Bypass Vulnerability | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

234: Oracle MySQL User Login Security Bypass Vulnerability 234: Oracle MySQL User Login Security Bypass Vulnerability U-234: Oracle MySQL User Login Security Bypass Vulnerability August 14, 2012 - 7:00am Addthis PROBLEM: Oracle MySQL User Login Security Bypass Vulnerability PLATFORM: Version(s): prior to 5.1.63 and 5.5.25 are vulnerable. ABSTRACT: Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions. REFERENCE LINKS: http://www.securityfocus.com/bid/53911/discuss CVE-2012-2122 IMPACT ASSESSMENT: Medium Discussion: Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.The vulnerability is identified as CVE-2012-2122 and was addressed in MySQL 5.1.63 and 5.5.25 in

454

U-145: Microsoft Security Bulletin Summary for April 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Summary for April 2012 5: Microsoft Security Bulletin Summary for April 2012 U-145: Microsoft Security Bulletin Summary for April 2012 April 11, 2012 - 9:30am Addthis PROBLEM: Microsoft Security Bulletin Summary for April 2012 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, ABSTRACT: Microsoft Security Bulletin Summary for April 2012. Microsoft has posted 4 Critical Bulletins and 2 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada). reference LINKS: Microsoft Security Bulletin Security Bulletin Summary Archive

455

T-642: RSA SecurID update to Customers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

456

Sandia secure processor : a native Java processor.  

SciTech Connect

The Sandia Secure Processor (SSP) is a new native Java processor that has been specifically designed for embedded applications. The SSP's design is a system composed of a core Java processor that directly executes Java bytecodes, on-chip intelligent IO modules, and a suite of software tools for simulation and compiling executable binary files. The SSP is unique in that it provides a way to control real-time IO modules for embedded applications. The system software for the SSP is a 'class loader' that takes Java .class files (created with your favorite Java compiler), links them together, and compiles a binary. The complete SSP system provides very powerful functionality with very light hardware requirements with the potential to be used in a wide variety of small-system embedded applications. This paper gives a detail description of the Sandia Secure Processor and its unique features.

Wickstrom, Gregory Lloyd; Gale, Jason Carl; Ma, Kwok Kee

2003-08-01T23:59:59.000Z

457

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... cyber maryLaNd summit. Please NOTE -- Last Updated Wednesday, January 20, 2010. PRESENTATIONS: ... NIST Voting Cyber Security: ...

458

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Georgia Technology Information Security Center (GTISC); Idaho State University National Center of Academic Excellence in Information Assurance: ...

459

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Incident Response. Contingency Planning and Disaster Response; Incident Identification, Reporting, and Response. Back to Top Security Controls. ...

460

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... to security control selection and specification considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders ...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and OMB have instituted laws, regulations, and directives that govern ... August 2004, Homeland Security Presidential Directive/Hspd-12 Subject ...

462

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... The PRISMA is based upon existing federal directives including Federal Information Security Management Act (FISMA), NIST guidelines and other ...

463

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Special Publication 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security; February ...

464

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... PIV Implementation, Daniel Wood, Treasury; Electricity Subsector Cybersecurity ... Basic Input/Output System (BIOS) Security - Andrew Regenscheid ...

465

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... North Korean nuclear proliferation - using distributed ... in a Collaborative Environment - "to investigate ... can fulfil the current security requirements of ...

466

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... security including, but not limited to: accreditation, audit trails, authorization ... US Department of Energy Computer Incident Advisory Capability (CIAC ...

467

Nuclear Safeguards and Security | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

468

V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors when handling file actions can be exploited to bypass file action permission restrictions and e.g. create or read arbitrary files within or outside the webroot. 2) An error when validating file names within the file renaming functionality can be exploited to bypass the denied file extensions check

469

V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Apache XML Security XPointer Expressions Processing Buffer 8: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability June 28, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Apache XML Security PLATFORM: vulnerability is reported in versions prior to 1.7.2 ABSTRACT: The vulnerability addresses the possibility of a heap overflow condition REFERENCE LINKS: Secunia Advisory SA53959 Apache Advisory CVE-2013-2210 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error within the XML Signature Reference processing code and can be exploited to cause a heap-based buffer overflow via a specially crafted document containing malformed XPointer expressions. IMPACT: Successful exploitation may allow execution of arbitrary code

470

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

471

Ultra Safe And Secure Blasting System  

SciTech Connect

The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

Hart, M M

2009-07-27T23:59:59.000Z

472

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

473

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

474

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

475

Climate Change and National Security  

Science Conference Proceedings (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communitieswith resultant advantages and differences. Climate change research has ...

Elizabeth L. Malone

2013-01-01T23:59:59.000Z

476

Departmental Personnel Security- Clearance Automation  

Energy.gov (U.S. Department of Energy (DOE))

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

477

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Planning and Management DOE M 470.4-1, Chg 2, dated 102010, Safeguards and Security Program Planning and Management Physical Security DOE NAP 70.2, Chg 1, dated 72011,...

478

Security Services Management (Section B)  

Science Conference Proceedings (OSTI)

To take the next step in information security, Security Services Management provides a comprehensive approach to managing people, process, and technology through the sound application of metrics. This book demonstrates how to develop a balanced strategy ...

James S. Tiller

2007-07-01T23:59:59.000Z

479

Security_Walls_VPP_Award  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Force Recognized for Outstanding Safety CARLSBAD, N.M., May 10, 2013 - The U.S. Department of Energy (DOE) has awarded Security Walls, LLC, the Waste Isolation Pilot...

480

Security Ontology for Annotating Resources  

E-Print Network (OSTI)

Abstract. Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ontologies in other domains that focus on annotation of functional aspects of resources. Types of security information that could be described include mechanisms, protocols, objectives, algorithms, and credentials in various levels of detail and specificity. The NRL Security Ontology is more comprehensive and better organized than existing security ontologies. It is capable of representing more types of security statements and can be applied to any electronic resource. The class hierarchy of the ontology makes it both easy to use and intuitive to extend. We applied this ontology to a Service Oriented Architecture to annotate security aspects of Web service descriptions and queries. A refined matching algorithm was developed to perform requirement-capability matchmaking that takes into account not only the ontology concepts, but also the properties of the concepts. 1

Anya Kim; Jim Luo; Myong Kang

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Standard-Related Links  

Science Conference Proceedings (OSTI)

... Standard-Related Links. ... Association for Clinical Chemistry ACS - American Chemical Society ANSI - American National Standards Institute AOAC ...

2013-06-28T23:59:59.000Z

482

FOIA | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

483

Distribution System Cyber Security Architecture  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) has developed the NISTIR 7628: Guidelines for Smart Grid Cyber Security, while ASAP-SG has developed both the Security Profile for AMI (v2.0) and the Security Profile for Distribution Management. These documents are necessarily high level and generic, covering a broad range of smart grid assets, and focus exclusively on determining the security requirements. However, utilities and their vendors often cannot get a clear picture of what existing tec...

2010-12-31T23:59:59.000Z

484

Secure Systems and Applications Group  

Science Conference Proceedings (OSTI)

... technologies, and on developing security solutions ... the earliest stages of technology development through proof ... industry, and to develop tests, test ...

2013-01-17T23:59:59.000Z

485

Pollux | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Pollux | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

486

Testimonials | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Testimonials | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

487

Training | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

488

Counterterrorism | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

489

Vocabulary | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

490

Pantex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

491

Awards | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

492

Policy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

493

Supercomputers | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

494

Engineering | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

495

Contacts | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

496

Accomplishments | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

497

Preparedness | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

498

Public | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

499

Recovery | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

500

Nonproliferation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...