Powered by Deep Web Technologies
Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Broader source: Energy.gov (indexed) [DOE]

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

2

T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates...  

Broader source: Energy.gov (indexed) [DOE]

5: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection...

3

A dynamic kernel modifier for linux  

SciTech Connect (OSTI)

Dynamic Kernel Modifier, or DKM, is a kernel module for Linux that allows user-mode programs to modify the execution of functions in the kernel without recompiling or modifying the kernel source in any way. Functions may be traced, either function entry only or function entry and exit; nullified; or replaced with some other function. For the tracing case, function execution results in the activation of a watchpoint. When the watchpoint is activated, the address of the function is logged in a FIFO buffer that is readable by external applications. The watchpoints are time-stamped with the resolution of the processor high resolution timers, which on most modem processors are accurate to a single processor tick. DKM is very similar to earlier systems such as the SunOS trace device or Linux TT. Unlike these two systems, and other similar systems, DKM requires no kernel modifications. DKM allows users to do initial probing of the kernel to look for performance problems, or even to resolve potential problems by turning functions off or replacing them. DKM watchpoints are not without cost: it takes about 200 nanoseconds to make a log entry on an 800 Mhz Pentium-Ill. The overhead numbers are actually competitive with other hardware-based trace systems, although it has less 'Los Alamos National Laboratory is operated by the University of California for the National Nuclear Security Administration of the United States Department of Energy under contract W-7405-ENG-36. accuracy than an In-Circuit Emulator such as the American Arium. Once the user has zeroed in on a problem, other mechanisms with a higher degree of accuracy can be used.

Minnich, R. G. (Ronald G.)

2002-09-03T23:59:59.000Z

4

Fractal Weyl law for Linux Kernel Architecture  

E-Print Network [OSTI]

We study the properties of spectrum and eigenstates of the Google matrix of a directed network formed by the procedure calls in the Linux Kernel. Our results obtained for various versions of the Linux Kernel show that the spectrum is characterized by the fractal Weyl law established recently for systems of quantum chaotic scattering and the Perron-Frobenius operators of dynamical maps. The fractal Weyl exponent is found to be $\

L. Ermann; A. D. Chepelianskii; D. L. Shepelyansky

2010-09-16T23:59:59.000Z

5

T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send...  

Broader source: Energy.gov (indexed) [DOE]

Process Lets Local Users Send Spoofed Signals T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals June 23, 2011 - 4:49am Addthis PROBLEM:...

6

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

7

U-175: Linux Kernel KVM Memory Slot Management Flaw  

Broader source: Energy.gov [DOE]

A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system.

8

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

9

T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals  

Broader source: Energy.gov [DOE]

A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

10

T-667: Red Hat Enterprise Linux kernel security and bug fix update  

Broader source: Energy.gov [DOE]

It was found that an mmap() call with the MAP_PRIVATE flag on "/dev/zero" would create transparent hugepages and trigger a certain robustness check. A local, unprivileged user could use this flaw to cause a denial of service. (CVE-2011-2479, Moderate)

11

T-726:Linux-2.6 privilege escalation/denial of service/information leak  

Broader source: Energy.gov [DOE]

Vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak.

12

Security enhancements for FPGA-based MPSoCs: a boot-to-runtime protection flow for an embedded  

E-Print Network [OSTI]

Security enhancements for FPGA-based MPSoCs: a boot-to-runtime protection flow for an embedded solutions to securely boot a bitstream and the associated OS while runtime transactions are not protected. This work proposes a full boot-to-runtime protection flow of an embedded Linux kernel during boot

Paris-Sud XI, Université de

13

Making Linux Protection Mechanisms Egalitarian with UserFS Taesoo Kim and Nickolai Zeldovich  

E-Print Network [OSTI]

changes to the Linux kernel--a single 3,000-line kernel module--and incurs no performance overhead of lines of code, we prevented attackers from exploiting application-level vul- nerabilities, such as code. This paper presents the design of UserFS, a kernel framework that allows any application to use traditional

Sabatini, David M.

14

T-700:Red Hat: kernel security, bug fix, and enhancement update...  

Broader source: Energy.gov (indexed) [DOE]

processes to gather confidential information, such as the length of a password used in a process. (CVE-2011-2495, Low) Impact: Bug 690028 - CVE-2011-1182 kernel signal spoofing...

15

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges  

Broader source: Energy.gov [DOE]

An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5.

16

Red Hat Enterprise Linux 3 The Next Generation Of Enterprise Class Linux  

E-Print Network [OSTI]

Page 1 Red Hat Enterprise Linux 3 The Next Generation Of Enterprise Class Linux Ken Crandall Engineer, Red Hat Version: 3.7ICCAD #12;Page 2 Agenda Why Red Hat Enterprise Linux Workstations High Performance Computing Summary Q & A #12;Page 3 Why Red Hat Enterprise Linux? Version: 3.7ICCAD #12;Page 4

17

V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer...  

Broader source: Energy.gov (indexed) [DOE]

due to a boundary error within the "iscsiaddnotunderstoodresponse()" function (driverstargetiscsiiscsitargetparameters.c) when parsing keys and can be exploited to...

18

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

19

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Broader source: Energy.gov (indexed) [DOE]

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

20

Working with Code UIC Linux Users Group  

E-Print Network [OSTI]

what you use nano/pico vim eclipse compiling g++ javac makefiles debugging introduction tools tips resources what you use nano/pico vim eclipse beginner logic concept: programing is hard and scary. we should use nano/pico vim eclipse nano familiar interface included in almost every linux distribution UIC

Ben-Arie, Jezekiel

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

UNIX/LINUX REFERENCE CARD Basic File and Directory Manipulation  

E-Print Network [OSTI]

UNIX/LINUX REFERENCE CARD Basic File and Directory Manipulation ls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . List directory contents cp. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Link files cd. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Change directory pwd

22

EERC Linux Download | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeat Pump Models |Conduct,Final9:Department of Energy atDepartment ofClimateLinux

23

Booting Linux: The History and the Future Werner Almesberger  

E-Print Network [OSTI]

Booting Linux: The History and the Future Werner Almesberger Werner.Almesberger@ep .ch June 25, 2000 Abstract Booting an operating system means to mediate be- tween a usually very basic beginnings of the oppy boot sec- tor, the Linux boot process has grown rich function- ality, with versatile

Almesberger, Werner

24

Kurucz's codes under GNU-Linux  

E-Print Network [OSTI]

We report on the latest version of our GNU-Linux port of the ATLAS - SYNTHE - WIDTH suite of codes for the stellar atmosphere modeling. The latest version (8.1 at the time of the workshop) of the Intel Fortran Compiler allowed for a significantly better backward compatibility with the VMS version of the code, thus allowing us to remove almost all the modifications we initially introduced in order to compile the code under IFC. We now provide ported versions both of ATLAS 9 (the ODF version of ATLAS) and ATLAS 12 (the opacity sampling version). A comprehensive website has been created to host the ported codes, along with a growing body of documentation and resources. Also, three mailing lists have been created at the university of Ljubljana in order to cover general usage, code development and ATLAS-related announcements.

L. Sbordone

2005-09-13T23:59:59.000Z

25

COMPUTER SECURITY revision list Subject Notes  

E-Print Network [OSTI]

COMPUTER SECURITY revision list Subject Notes AES DES 3-DES CBC Diffie-Hellman Elgaml RSA KeyCrypt Electronic Signatures PGP Access Control Matrix Access Control Lists #12;COMPUTER SECURITY revision list for Linux Confused Deputy Problem MD5 SHA1 SHA2 / SHA256 / SHA512 SHA3 Collision attacks MAC Password

Chothia, Tom

26

U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial...  

Broader source: Energy.gov (indexed) [DOE]

The vulnerability is caused due to an error in the Solarflare network driver (driversnetethernetsfctx.c) when handling TCP segments and can be exploited via a...

27

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | Department ofElevated

28

V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department

29

U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMBFirmware

30

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMBFirmwareVulnerability

31

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting AttacksForgery,Department

32

U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address Bar,

33

U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address|

34

GENERALIZED DYNAMIC PROBES FOR THE LINUX KERNEL AND APPLICATIONS WITH ARACHNE  

E-Print Network [OSTI]

-Marc Menaud Obasco Group, EMN-INRIA, LINA 4, rue Alfred Kastler 44307 Nantes, France {Nicolas.Loriant, Jean-Marc.Menaud

Paris-Sud XI, Université de

35

Multi-view kernel construction  

E-Print Network [OSTI]

5157-z Multi-view kernel construction Virginia R. de Sa multiple different graph construction algorithms. The Ng et

Sa, Virginia R.; Gallagher, Patrick W.; Lewis, Joshua M.; Malave, Vicente L.

2010-01-01T23:59:59.000Z

36

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw...  

Broader source: Energy.gov (indexed) [DOE]

0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users...

37

SSL-VPN unter Linux (Ubuntu) mit Network Stand: 28. April 2010  

E-Print Network [OSTI]

SSL-VPN unter Linux (Ubuntu) mit Network Connect Stand: 28. April 2010 1 Vorwort Folgende@cms.hu-berlin.de #12;SSL-VPN unter Linux (Ubuntu) mit Network Connect Im Gnome die Paketverwaltung ber Anwen- dungMail: oper@cms.hu-berlin.de #12;SSL-VPN unter Linux (Ubuntu) mit Network Connect 4 VPN-Verbindung aufbauen

Peters, Achim

38

Making Linux protection mechanisms egalitarian with UserFS  

E-Print Network [OSTI]

UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user-not just the system administrator-to allocate Unix user IDs, to use chroot, and to set up firewall rules in order to confine untrusted ...

Kim, Taesoo, Ph. D. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

39

Making Linux Protection Mechanisms Egalitarian with UserFS  

E-Print Network [OSTI]

UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any usernot just the system administratorto allocate Unix user IDs, to use chroot, and to set up firewall rules in order to confine untrusted ...

Kim, Taesoo

40

Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O Zongwei Zhou Miao Yu Virgil D. Gligor  

E-Print Network [OSTI]

. This paper presents a security architecture based on a wimpy kernel that provides on-demand isolated I and complexity of the wimpy kernel are minimized by safely outsourcing I/O subsystem functions to an untrusted untrust- worthy software components will certainly continue to exist in future commodity platforms

Tague, Patrick

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Implementations of the Integrated Linux, Windows and Macintosh Cluster for achieving the Personal High Performance Computing  

E-Print Network [OSTI]

SUMMARY The motivation and objective for this paper is to demonstrate (1) the integrated Linux (30 distributions, including Red Hat and SUSE), Windows (Cluster 2003 and Server 2003) and Macintosh (Tiger 10.4) cluster for running Web Services and jobs; and (2) the demonstration of the Personal High Performance Computing (PHPC), which only require a smaller number of computers, resources and space in the secure Gigabytes of 1,000 Mps and Wi-Fi/3G of 108 Mbps networking environments. This PHPC is based on a cluster of the 32-bit and 64-bit AMD and Intel dualcore machines, which can achieve the following: (a) jobs are shared amongst different platforms, which can run as a single job altogether or run different jobs concurrently; (b) running Java and.NET Web Services; (c) receiving up to a 60 % better performance referring to multi-tasking performance; (e) ensuring a secure networking environment, which includes VPN, in-build firewall and integrated wired and wireless networks; (f) storing a massive amount of data (12 TB, or 12,000 GB) for database and server applications; and (g) successfully integrating with other technologies such as the integrated Java and.NET Web Services,

Victor Chang

42

Robotic intelligence kernel  

DOE Patents [OSTI]

A robot platform includes perceptors, locomotors, and a system controller. The system controller executes a robot intelligence kernel (RIK) that includes a multi-level architecture and a dynamic autonomy structure. The multi-level architecture includes a robot behavior level for defining robot behaviors, that incorporate robot attributes and a cognitive level for defining conduct modules that blend an adaptive interaction between predefined decision functions and the robot behaviors. The dynamic autonomy structure is configured for modifying a transaction capacity between an operator intervention and a robot initiative and may include multiple levels with at least a teleoperation mode configured to maximize the operator intervention and minimize the robot initiative and an autonomous mode configured to minimize the operator intervention and maximize the robot initiative. Within the RIK at least the cognitive level includes the dynamic autonomy structure.

Bruemmer, David J. (Idaho Falls, ID)

2009-11-17T23:59:59.000Z

43

Math 311w-01 Laboratory 2: Introduction to Linux and Python  

E-Print Network [OSTI]

.pdf http://www.math.psu.edu/treluga/311w/lab2/linuxReferenceCard.pdf In the terminal, type "ipython

Reluga, Tim

44

Ksplice: Automatic Rebootless Kernel Updates  

E-Print Network [OSTI]

Ksplice allows system administrators to apply patches to their operating system kernels without rebooting. Unlike previous hot update systems, Ksplice operates at the object code layer, which allows Ksplice to transform ...

Kaashoek, M. Frans

2009-01-01T23:59:59.000Z

45

INFO-F-309 Administration des Systmes TP1: Installation de Linux et gestion des packages  

E-Print Network [OSTI]

INFO-F-309 Administration des Systmes TP1: Installation de Linux et gestion des packagesBox. Ensuite nous verrons comment fonctionne la gestion de packages, la mise jour du systme et l la gestion de packages. 2 Installation de Linux 2.1 Prparation Surtout lorsqu'il s'agit d'un serveur

Collette. Sbastien

46

Tri-Laboratory Linux Capacity Cluster 2007 SOW  

SciTech Connect (OSTI)

The Advanced Simulation and Computing (ASC) Program (formerly know as Accelerated Strategic Computing Initiative, ASCI) has led the world in capability computing for the last ten years. Capability computing is defined as a world-class platform (in the Top10 of the Top500.org list) with scientific simulations running at scale on the platform. Example systems are ASCI Red, Blue-Pacific, Blue-Mountain, White, Q, RedStorm, and Purple. ASC applications have scaled to multiple thousands of CPUs and accomplished a long list of mission milestones on these ASC capability platforms. However, the computing demands of the ASC and Stockpile Stewardship programs also include a vast number of smaller scale runs for day-to-day simulations. Indeed, every 'hero' capability run requires many hundreds to thousands of much smaller runs in preparation and post processing activities. In addition, there are many aspects of the Stockpile Stewardship Program (SSP) that can be directly accomplished with these so-called 'capacity' calculations. The need for capacity is now so great within the program that it is increasingly difficult to allocate the computer resources required by the larger capability runs. To rectify the current 'capacity' computing resource shortfall, the ASC program has allocated a large portion of the overall ASC platforms budget to 'capacity' systems. In addition, within the next five to ten years the Life Extension Programs (LEPs) for major nuclear weapons systems must be accomplished. These LEPs and other SSP programmatic elements will further drive the need for capacity calculations and hence 'capacity' systems as well as future ASC capability calculations on 'capability' systems. To respond to this new workload analysis, the ASC program will be making a large sustained strategic investment in these capacity systems over the next ten years, starting with the United States Government Fiscal Year 2007 (GFY07). However, given the growing need for 'capability' systems as well, the budget demands are extreme and new, more cost effective ways of fielding these systems must be developed. This Tri-Laboratory Linux Capacity Cluster (TLCC) procurement represents the ASC first investment vehicle in these capacity systems. It also represents a new strategy for quickly building, fielding and integrating many Linux clusters of various sizes into classified and unclassified production service through a concept of Scalable Units (SU). The programmatic objective is to dramatically reduce the overall Total Cost of Ownership (TCO) of these 'capacity' systems relative to the best practices in Linux Cluster deployments today. This objective only makes sense in the context of these systems quickly becoming very robust and useful production clusters under the crushing load that will be inflicted on them by the ASC and SSP scientific simulation capacity workload.

Seager, M

2007-03-22T23:59:59.000Z

47

Multi Cloud Architecture to Provide Data Security And Integrity  

E-Print Network [OSTI]

Abstract-- Cloud servers are being used to store data and application but its security is a major issue in current context. To solve the data security problems in public environment we propose an effective model for security and integrity of data stored in a cloud, through data segmentation followed by data encryption programs in a multiple cloud architecture. This architecture forms a multi cloud system where primary cloud is available for multiple users for data storage offering lesser load on client systems thereby using the cloud computing architecture. This architecture introduces a secondary cloud controlled by a single administrator which provides the data backup for primary cloud after undergoing specific segmentation and encryption algorithms to ensure security and integrity of data. The proposed system also offers protection against virus attacks by using linux as the base OS. Keywords-- Encryption, Linux, Multi cloud system, Primary cloud, Secondary cloud, Segmentation.

Nikhil Dutta; Himanshu Bakshi; Mujammill Mulla; Viraj Shinde

48

Adaptive wiener image restoration kernel  

DOE Patents [OSTI]

A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

Yuan, Ding (Henderson, NV)

2007-06-05T23:59:59.000Z

49

Frequent Pattern Mining for Kernel Trace Data Christopher LaRosa, Li Xiong, Ken Mandelberg  

E-Print Network [OSTI]

, application programmers, operating systems engineers, and security analysts. In the systems area, data miningFrequent Pattern Mining for Kernel Trace Data Christopher LaRosa, Li Xiong, Ken Mandelberg patterns and other recurring runtime execution patterns in operating system trace logs, we employ data

Xiong, Li

50

Cooperative Multitasking for Heterogeneous Accelerators in the Linux Completely Fair Scheduler  

E-Print Network [OSTI]

Cooperative Multitasking for Heterogeneous Accelerators in the Linux Completely Fair Scheduler to be aware of accelerators, hold different run queues for these components and perform scheduling decisions migration of applications between accelerators. We show that cooperative multitasking is possible

Hellebrand, Sybille

51

Cabala : a speculative execution framework to make Linux services fault tolerant  

E-Print Network [OSTI]

Cabala is a speculative execution framework that enables server programs in Linux to be fault tolerant. The errors it targets are run-time errors that are due to program bugs, and which cause program exit; in particular, ...

Joshi, Kavya (Kavya U.)

2013-01-01T23:59:59.000Z

52

Adaptacin de un driver WLAN Linux a una arquitectura NIOS-Avalon  

E-Print Network [OSTI]

Adaptación de un driver WLAN Linux a una arquitectura NIOS-Avalon B. Martínez , I. Tarruella, D de un driver Linux se realiza un mapeo sobre una arquitectura basada en un procesador integrado dentro de un SoC. La elección de la partición Hw/Sw y de ciertos parámetros de la arquitectura se

Autònoma de Barcelona, Universitat

53

Learning Kernels -Tutorial Part IV: Software Solutions  

E-Print Network [OSTI]

Kernel.org http://www.openkernel.org · DOGMA (online alg: UFO) http://dogma.sourceforge.net/index.html · MKL

Mohri, Mehryar

54

'ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON  

E-Print Network [OSTI]

'ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON Abstract.We clarify the relationship between higher 'etale wild kernels * *of a number- cyclotomic tower of the field. We also determine the relationship betwee* *n the 'etale wild kernel

55

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol...  

Broader source: Energy.gov (indexed) [DOE]

Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An...

56

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

57

Kernelization and Enumeration: New Approaches to Solving Hard Problems  

E-Print Network [OSTI]

their sizes. We present a 2k kernel for the cluster editing problem, which improves the previous best kernel of size 4k; We also present a linear kernel of size 7k 2d for the d-cluster editing problem, which is the first linear kernel for the problem...

Meng, Jie

2011-08-08T23:59:59.000Z

58

Zugang zu LISP Franz Inc. Allegro Lisp Version 7.0 ist im Linux Pool installiert.  

E-Print Network [OSTI]

Zugang zu LISP Franz Inc. Allegro Lisp Version 7.0 ist im Linux Pool installiert. 1. Moglichkeit: Benutzung in der Shell: 1) Aufruf mit alisp"xy@wsl05:~$ alisp International Allegro CL Enterprise Edition 7 of Allegro CL is licensed to: [TC8180] Universitat Ulm ; Loading home .clinit.cl file. ;; Optimization

Pfeifer, Holger

59

Clustering and Inconsistent Information: A Kernelization Approach  

E-Print Network [OSTI]

CLUSTERING AND INCONSISTENT INFORMATION: A KERNELIZATION APPROACH A Dissertation by YIXIN CAO Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements for the degree of DOCTOR OF PHILOSOPHY... May 2012 Major Subject: Computer Science CLUSTERING AND INCONSISTENT INFORMATION: A KERNELIZATION APPROACH A Dissertation by YIXIN CAO Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements...

Cao, Yixin

2012-07-16T23:59:59.000Z

60

Accuracy of Reduced and Extended Thin-Wire Kernels  

SciTech Connect (OSTI)

Some results are presented comparing the accuracy of the reduced thin-wire kernel and an extended kernel with exact integration of the 1/R term of the Green's function and results are shown for simple wire structures.

Burke, G J

2008-11-24T23:59:59.000Z

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Contracting the Wigner-Kernel of a Spin to the Wigner-Kernel of a Particle  

E-Print Network [OSTI]

A general relation between the Moyal formalisms for a spin and a particle is established. Once the formalism has been set up for a spin, the phase-space description of a particle is obtained from the `contraction' of the group of rotations to the group of translations. This is shown by explicitly contracting a spin Wigner-kernel to the Wigner kernel of a particle. In fact, only one out of 2^{2s} different possible kernels for a spin shows this behaviour.

Jean-Pierre Amiet; Stefan Weigert

2000-04-13T23:59:59.000Z

62

Kernel Machine Based Feature Extraction Algorithms for Regression Problems  

E-Print Network [OSTI]

Kernel Machine Based Feature Extraction Algorithms for Regression Problems Csaba Szepesv´ari 1 and Andr´as Kocsor and Korn´el Kov´acs 2 Abstract. In this paper we consider two novel kernel machine based performance of the algorithm. The second algo- rithm combines kernel machines with average derivative

Szepesvari, Csaba

63

ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON  

E-Print Network [OSTI]

#19; ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON Abstract. We clarify the relationship between higher #19;etale wild kernels of a number #12;eld at the prime 2 and the Galois between the #19;etale wild kernel and the group of in#12;nitely divisible elements of H 2 (F; Z 2 (j + 1

64

ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON  

E-Print Network [OSTI]

´ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON Abstract. We clarify the relationship between higher ´etale wild kernels of a number field at the prime 2 and the Galois between the ´etale wild kernel and the group of infinitely divisible elements of H2 (F, Z2(j + 1)){2}. 1

65

Transductive Reliability Estimation for Kernel Based Classifiers  

E-Print Network [OSTI]

Transductive Reliability Estimation for Kernel Based Classifiers Dimitris Tzikas1 , Matjaz Kukar2@cs.uoi.gr Abstract. Estimating the reliability of individual classifications is very important in several applications such as medical diagnosis. Recently, the transductive approach to reliability estimation has been

Likas, Aristidis

66

The Daemon Kernel of the Sun  

E-Print Network [OSTI]

The daemon-stimulated proton decay is capable of providing an appreciable part of the Sun luminosity as well as nonelectron flavor component in the solar neutrino flux. This follows (1) from our experiments on detection of negative daemons in Earth-crossing orbits, which give ~1 microsec for the decay time of a daemon-containing proton, and (2) from an estimate of the total number of daemons which could be captured by the Sun from the Galactic disk (up to \\~2.4E30). Because of their huge mass (~3E-5 g), the captured daemons form in the Sun's center a kernel a few cm in size. The protons diffuse into the kernel to decay there with a release of energy. Physically sound estimates of the parameters of the kernel can be obtained if it consists mainly of negative daemons. Proton decay maintains a high temperature of the daemon gas (up to \\~1E11-1E12 K), which makes it physically collisionless and prevents kernel collapse into a black hole.

E. M. Drobyshevski

2002-05-21T23:59:59.000Z

67

Measurements of the Thermal Neutron Scattering Kernel  

E-Print Network [OSTI]

Measurements of the Thermal Neutron Scattering Kernel Li (Emily) Liu, Yaron Danon, Bjorn Becker and discussions Problems and Future study Questions #12;3 M. Mattes and J. Keinert, Thermal Neutron Scattering experimental data used was from 1973-1974! M. Mattes and J. Keinert, Thermal Neutron Scattering Data

Danon, Yaron

68

Kernel methods for phenotyping complex plant architecture  

E-Print Network [OSTI]

Kernel methods for phenotyping complex plant architecture Koji KAWAMURA1,2 ,Laurence HIBRAND´e, FRANCE , 2. Department of Environmental Engineering, Osaka Institute of Technology, 5-16-1 Ohmiya, Asahi architecture is a crit- ical step for understanding the genetic determinism of plant architecture. Previous

Paris-Sud XI, Université de

69

RELAP5-3D Developmental Assessment: Comparison of Version 4.2.1i on Linux and Windows  

SciTech Connect (OSTI)

Figures have been generated comparing the parameters used in the developmental assessment of the RELAP5-3D code, version 4.2i, compiled on Linux and Windows platforms. The figures, which are the same as those used in Volume III of the RELAP5-3D code manual, compare calculations using the semi-implicit solution scheme with available experiment data. These figures provide a quick, visual indication of how the code predictions differ between the Linux and Windows versions.

Paul D. Bayless

2014-06-01T23:59:59.000Z

70

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

71

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

72

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

73

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

74

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

75

Nonlinear Multiple Kernel Learning via Mixture of Probabilistic Kernel Discriminant Analysis  

E-Print Network [OSTI]

.ye@asu.edu Computer Science & Engineering Arizona State University Shipeng Yu shipeng.yu@siemens.com CAD and Knowledge Solutions Siemens Medical Solutions USA, Inc. Huan Liu huan.liu@asu.edu Computer Science & Engineering, and in the transformed space, instances can be better separated. A kernel can be constructed in the transformed space

Liu, Huan

76

Intel's Math Kernel Library (MKL) at NERSC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEM with0, First Solar,VTune VTuneKernel

77

Customized Kernel Execution on Reconfigurable Hardware for Embedded Applications  

E-Print Network [OSTI]

is required. This can be facilitated through dynamic adaptation of the silicon resources in reconfigurable reconfiguration overheads can be estimated. Therefore, if the scheduling of time- consuming kernels considers also kernels. Experiments involving EEMBC (EDN Embedded Microprocessor Benchmarking Consortium) and Mi

Ziavras, Sotirios G.

78

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

79

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

80

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

82

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

83

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

84

ret2dir: Rethinking Kernel Isolation Vasileios P. Kemerlis Michalis Polychronakis Angelos D. Keromytis  

E-Print Network [OSTI]

) attacks redirect corrupted kernel pointers to data residing in user space. In response, sev- eral kernel code in privileged mode, or tamper-with critical kernel data structures, by exploiting a kernel, and are applicable in x86/x86-64, ARM, and other popular architectures. In response to ret2usr attacks, several

Yang, Junfeng

85

Jatropha Curcas Kernel Meals Obtained From Four Different Agro-Climatic Areas of Ghana:  

E-Print Network [OSTI]

) concentration of Jatropha curcas kernel meals (KM) obtained from four different agro-climatic conditions. The

S. K. Chikpah; B. Demuyakor

86

Classification using Intersection Kernel Support Vector Machines is Efficient Subhransu Maji  

E-Print Network [OSTI]

Classification using Intersection Kernel Support Vector Machines is Efficient Subhransu Maji EECS classification using kernelized SVMs re- quires evaluating the kernel for a test vector and each of the support vectors. For a class of kernels we show that one can do this much more efficiently. In particular we show

O'Brien, James F.

87

HIGHER WILD KERNELS AND DIVISIBILITY IN THE K-THEORY OF NUMBER FIELDS  

E-Print Network [OSTI]

HIGHER WILD KERNELS AND DIVISIBILITY IN THE K, 2004 Abstract. The higher wild kernels are finite subgroups of the even K-group* *s of a number field F, generalizing Tate's wild kernel for K2. Each wild kernel contains* * the subgroup

Weibel, Charles

88

HIGHER WILD KERNELS AND DIVISIBILITY IN THE K-THEORY OF NUMBER FIELDS  

E-Print Network [OSTI]

HIGHER WILD KERNELS AND DIVISIBILITY IN THE K-THEORY OF NUMBER FIELDS C. Weibel July 15, 2004 Abstract. The higher wild kernels are #12;nite subgroups of the even K-groups of a number #12;eld F , generalizing Tate's wild kernel for K2 . Each wild kernel contains the subgroup of divisible elements

89

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

90

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

91

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

92

Future Trends in Secure Chip Data Management Nicolas Anciaux, Luc Bouganim and Philippe Pucheral  

E-Print Network [OSTI]

of scaling down database techniques for the smart card and proposed the design of a DBMS kernel called PicoDBMS. This paper summarizes the learning obtained during an extensive performance analysis of PicoDBMS. Then it studies to which extent secure chips hardware evolution should impact the design of embedded data

93

NSTX-U Advances in Real-time C++11 on Linux  

SciTech Connect (OSTI)

Programming languages like C and Ada combined with proprietary embedded operating systems have dominated the real-time application space for decades. The new C++11standard includes native, language-level support for concurrency, a required feature for any nontrivial event-oriented real-time software. Threads, Locks, and Atomics now exist to provide the necessary tools to build the structures that make up the foundation of a complex real-time system. The National Spherical Torus Experiment Upgrade (NSTX-U) at the Princeton Plasma Physics Laboratory (PPPL) is breaking new ground with the language as applied to the needs of fusion devices. A new Digital Coil Protection System (DCPS) will serve as the main protection mechanism for the magnetic coils, and it is written entirely in C++11 running on Concurrent Computer Corporation's real-time operating system, RedHawk Linux. It runs over 600 algorithms in a 5 kHz control loop that determine whether or not to shut down operations before physical damage occurs. To accomplish this, NSTX-U engineers developed software tools that do not currently exist elsewhere, including real-time atomic synchronization, real-time containers, and a real-time logging framework. Together with a recent (and carefully configured) version of the GCC compiler, these tools enable data acquisition, processing, and output using a conventional operating system to meet a hard real-time deadline (that is, missing one periodic is a failure) of 200 microseconds.

Erickson, Keith G

2014-04-01T23:59:59.000Z

94

Green's kernels for transmission problems in bodies with small inclusions  

E-Print Network [OSTI]

The uniform asymptotic approximation of Green's kernel for the transmission problem of antiplane shear is obtained for domains with small inclusions. The remainder estimates are provided. Numerical simulations are presented to illustrate the effectiveness of the approach.

Vladimir Maz'ya; Alexander Movchan; Michael Nieves

2010-05-24T23:59:59.000Z

95

Many Molecular Properties from One Kernel in Chemical Space  

E-Print Network [OSTI]

We introduce property-independent kernels for machine learning modeling of arbitrarily many molecular properties. The kernels encode molecular structures for training sets of varying size, as well as similarity measures sufficiently diffuse in chemical space to sample over all training molecules. Corresponding molecular reference properties provided, they enable the instantaneous generation of ML models which can systematically be improved through the addition of more data. This idea is exemplified for single kernel based modeling of internal energy, enthalpy, free energy, heat capacity, polarizability, electronic spread, zero-point vibrational energy, energies of frontier orbitals, HOMO-LUMO gap, and the highest fundamental vibrational wavenumber. Models of these properties are trained and tested using 112 kilo organic molecules of similar size. Resulting models are discussed as well as the kernels' use for generating and using other property models.

Ramakrishnan, Raghunathan

2015-01-01T23:59:59.000Z

96

Hereditary kernel identification method of nonlinear polymeric viscoelastic materials  

E-Print Network [OSTI]

This paper deals with a polymeric matrix composite material. The matrix behaviour is described by the modified Rabotnov's nonlinear viscoelastic model assuming the material is nonlinear viscoelastic. The parameters of creep and stress-relaxation kernels of the model are determined. From the experimental data related to kernels approximated by spline functions and by means of the method of weighted residual, the formulas for the determination of viscoelastic parameters are derived.

Olodo Emmanuel; Villevo Adanhounme; Mahouton Norbert Hounkonnou

2012-12-26T23:59:59.000Z

97

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

98

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

99

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

100

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

102

NSTX-U Advances in Real-time C++11 on Linux | Princeton Plasma Physics Lab  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andData andFleet Test andFieldSubscribeJefferson Lab SecurityNSTX-U

103

PERI Auto-tuning Memory Intensive Kernels  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002OpticsPeriodical: Volume 5, Issue10/17/134,3-AStanford1

104

Robotics - Intelligence Kernel - Energy Innovation Portal  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 Resource Program SeptemberRobertIntelligent System CouldRobotics

105

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

106

The role of zinc in the treatment of palm kernel cake toxicity in sheep  

E-Print Network [OSTI]

Malaysia, 43400 UPM Serdang, Selangor, Malaysia Palm kernel cake (PKC), a product of the oil palm industryThe role of zinc in the treatment of palm kernel cake toxicity in sheep M Hair-Bejo, AR Alimon, J

Paris-Sud XI, Université de

107

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

108

TCX Project: High Assurance for Secure Embedded Systems Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine  

E-Print Network [OSTI]

: 1) high assurance life cycle framework and 2) high assurance rapid development environment (HARDE security safeguards are part of the high assurance life cycle framework. #12;The TCX development for use in simple embedded systems. To guide the kernel development, we have created a reusable high

Irvine, Cynthia E.

109

Graded multiplicities in the Macdonald kernel, Part I John R. Stembridge  

E-Print Network [OSTI]

Graded multiplicities in the Macdonald kernel, Part I John R. Stembridge Department of Mathematics notation B. Motivation C. Outline 2. Degenerate Macdonald polynomials A. The decomposition matrix B G has a Macdonald kernel associated to it. This kernel is a bigraded virtual G-character depending

Stembridge, John

110

Systematics of the Relationship between Vacuum Energy Calculations and Heat Kernel Coe#cients  

E-Print Network [OSTI]

Systematics of the Relationship between Vacuum Energy Calculations and Heat Kernel Coe#cients S. A Casimir energy is a nonlocal e#ect; its magnitude cannot be deduced from heat kernel expan­ sions, even in the regularized (but not yet renormalized) total vacuum energy are associated with the heat kernel coe

111

Application of Kernel Principal Component Analysis for Single Lead ECG-Derived Respiration  

E-Print Network [OSTI]

1 Application of Kernel Principal Component Analysis for Single Lead ECG-Derived Respiration Devy signal from ECGs. In this study, an improved ECG-derived respiration (EDR) algorithm based on kernel PCA ECGs. Index Terms--ECG-derived respiration (EDR), kernel princi- pal component analysis (kPCA). I

112

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

113

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

114

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

115

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

116

Kernel spectral clustering for predicting maintenance of industrial machines  

E-Print Network [OSTI]

to deal with sensory faults have been used [1],[2],[3]: corrective maintenance, preventive maintenance the machine fails, it is expensive and safety and environment issues arise. Preventive maintenance is basedKernel spectral clustering for predicting maintenance of industrial machines Rocco Langone1, Carlos

117

Rademacher Chaos Complexities for Learning the Kernel Yiming Ying1  

E-Print Network [OSTI]

1 Rademacher Chaos Complexities for Learning the Kernel Problem Yiming Ying1 mathying) and information-thereotic data integration (Ying et al., 2009) etc. Such MKL formulations have been successfully al., 2004; Damoulas and Girolami, 2008; Ying et al., 2009). The above mentioned MKL models usually

Ying, Yiming

118

Improving the Energy Efficiency of the MANTIS Kernel  

E-Print Network [OSTI]

Improving the Energy Efficiency of the MANTIS Kernel Cormac Duffy1 , Utz Roedig2 , John Herbert1. The event-based TinyOS is more energy efficient than the multi-threaded MANTIS system. However, MANTIS, timeliness can be traded for energy efficiency by choosing the appropriate operating system. In this paper we

Sreenan, Cormac J.

119

PERI - Auto-tuning Memory Intensive Kernels for Multicore  

SciTech Connect (OSTI)

We present an auto-tuning approach to optimize application performance on emerging multicore architectures. The methodology extends the idea of search-based performance optimizations, popular in linear algebra and FFT libraries, to application-specific computational kernels. Our work applies this strategy to Sparse Matrix Vector Multiplication (SpMV), the explicit heat equation PDE on a regular grid (Stencil), and a lattice Boltzmann application (LBMHD). We explore one of the broadest sets of multicore architectures in the HPC literature, including the Intel Xeon Clovertown, AMD Opteron Barcelona, Sun Victoria Falls, and the Sony-Toshiba-IBM (STI) Cell. Rather than hand-tuning each kernel for each system, we develop a code generator for each kernel that allows us to identify a highly optimized version for each platform, while amortizing the human programming effort. Results show that our auto-tuned kernel applications often achieve a better than 4X improvement compared with the original code. Additionally, we analyze a Roofline performance model for each platform to reveal hardware bottlenecks and software challenges for future multicore systems and applications.

Bailey, David H; Williams, Samuel; Datta, Kaushik; Carter, Jonathan; Oliker, Leonid; Shalf, John; Yelick, Katherine; Bailey, David H

2008-06-24T23:59:59.000Z

120

Analysis with Kernel Density Estimation University of Michigan / HERMES Collaboration  

E-Print Network [OSTI]

Analysis with Kernel Density Estimation S. Gliske University of Michigan / HERMES Collaboration Transverse Parton Structure of the Hadron Yerevan, Armenia 25 June, 2009 Gliske (HERMES / Michigan) Analysis/Smearing Effects SIDIS cos(n) Conclusion Gliske (HERMES / Michigan) Analysis with KDEs TPSH `09 2 / 24 #12

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Statistical Model Criticism using Kernel Two Sample Tests  

E-Print Network [OSTI]

Statistical Model Criticism using Kernel Two Sample Tests James Robert Lloyd Department Abstract We propose an exploratory approach to statistical model criticism using maximum mean discrepancy a statistic by which to measure discrepancies between data and a statistical model. MMD two sample tests

Ghahramani, Zoubin

122

On the kernelization of ranking r-CSP in tournaments  

E-Print Network [OSTI]

A Ranking r-Constraint Satisfaction Problem (ranking r-CSP) consists of a ground set of vertices V, an arity r > 2, a parameter k and a constraint system c, where c is a function which maps rankings of r-sized subsets of V to {0,1}. The objective is to decide if there exists a ranking ? of the vertices satisfying all but at most k constraints. Famous ranking r-CSP include the Feedback Arc Set in Tournaments and Betweenness in Tournaments problems. We consider these problems from the kernelization viewpoint. We first prove that Feedback Arc Set in Bipartite Tournaments admits a kernel with O(k^2) vertices, improving the previous bound of O(k^3) vertices. Next, we prove that so-called l_r-simply characterized ranking r-CSP admit linear vertex-kernels whenever they admit constant-factor approximation algorithms. This implies that r-Betweenness in Tournaments and r-Transitive Feedback Arc Set In Tournaments admit linear vertex-kernels. Finally, we consider another generalization of Feedback Arc Set in Tournaments...

Perez, Anthony

2012-01-01T23:59:59.000Z

123

Measurement Denoising Using Kernel Adaptive Filters in the Smart Grid  

E-Print Network [OSTI]

Measurement Denoising Using Kernel Adaptive Filters in the Smart Grid Zhe Chen and Robert C. Qiu@ieee.org, rqiu@tntech.edu Abstract--State estimation plays an important role in the smart grid. Conventionally, noisy measurements are directly used for state estimation. Today, in the context of the smart grid

Qiu, Robert Caiming

124

Optical transformation from chirplet to fractional Fourier transformation kernel  

E-Print Network [OSTI]

We find a new integration transformation which can convert a chirplet function to fractional Fourier transformation kernel, this new transformation is invertible and obeys Parseval theorem. Under this transformation a new relationship between a phase space function and its Weyl-Wigner quantum correspondence operator is revealed.

Hong-yi Fan; Li-yun Hu

2009-02-11T23:59:59.000Z

125

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

126

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

127

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

128

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

129

RINGS Registration and Security  

E-Print Network [OSTI]

Windows 98 100 22 -78 -78.00% Microsoft Windows ME 60 10 -50 -83.33% Microsoft Windows 2000 85 47 -38 -44.71% Microsoft Windows XP 2983 3419 436 12.75% Linux 2 15 13 86.67% Mac OS 216 373 157 42.09% Xbox 16 16 100.00% Xbox 360 8 8 100.00% PS2 3 3 100... permission from the author. ^kpo=ae`m Advanced Network Services Registry Developed by NTS Software Engineering Team LDAP Based Java Core Very Flexible Dustin Brown Software Engineer Copyright The University of Kansas 2006. This work...

Brown, Dustin

2006-06-15T23:59:59.000Z

130

The theory of diversity and redundancy in information system security : LDRD final report.  

SciTech Connect (OSTI)

The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Pierson, Lyndon George

2010-10-01T23:59:59.000Z

131

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

132

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

133

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

134

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

135

Kernel-Correlated Levy Field Driven Forward Rate and Application to Derivative Pricing  

SciTech Connect (OSTI)

We propose a term structure of forward rates driven by a kernel-correlated Levy random field under the HJM framework. The kernel-correlated Levy random field is composed of a kernel-correlated Gaussian random field and a centered Poisson random measure. We shall give a criterion to preclude arbitrage under the risk-neutral pricing measure. As applications, an interest rate derivative with general payoff functional is priced under this pricing measure.

Bo Lijun [Xidian University, Department of Mathematics (China); Wang Yongjin [Nankai University, School of Business (China); Yang Xuewei, E-mail: xwyangnk@yahoo.com.cn [Nanjing University, School of Management and Engineering (China)

2013-08-01T23:59:59.000Z

136

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

137

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

138

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

139

LinuxElectrons -Stretchable Silicon Could Be Next Wave in Electronics http://www.linuxelectrons.com/article.php/20051215232752400 1 of 3 12/21/2005 6:02 PM  

E-Print Network [OSTI]

LinuxElectrons - Stretchable Silicon Could Be Next Wave in Electronics http://www.linuxelectrons.com/article.phpElectrons - Stretchable Silicon Could Be Next Wave in Electronics http://www.linuxelectrons.com/article.php

Rogers, John A.

140

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

142

Reuse and Refactoring of GPU Kernels to Design Complex Applications Santonu Sarkar, Sayantan Mitra, Ashok Srinivasan  

E-Print Network [OSTI]

Reuse and Refactoring of GPU Kernels to Design Complex Applications Santonu Sarkar, Sayantan Mitra, Ashok Srinivasan Infosys Labs, Infosys Ltd. Bangalore 560100, India Email: {santonu sarkar01,sayantan

Srinivasan, Ashok

143

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

144

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

145

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

146

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

147

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

148

Operation of Faddeev-Kernel in Configuration Space  

E-Print Network [OSTI]

We present a practical method to solve Faddeev three-body equations at energies above three-body breakup threshold as integral equations in coordinate space. This is an extension of previously used method for bound states and scattering states below three-body breakup threshold energy. We show that breakup components in three-body reactions produce long-range effects on Faddeev integral kernels in coordinate space, and propose numerical procedures to treat these effects. Using these techniques, we solve Faddeev equations for neutron-deuteron scattering to compare with benchmark solutions.

S. Ishikawa

2007-01-16T23:59:59.000Z

149

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths

Goldberg, Sharon

150

Selection of Haploid Maize Kernels from Hybrid Kernels for Plant Breeding Using Near-Infrared Spectroscopy and SIMCA Analysis  

SciTech Connect (OSTI)

Samples of haploid and hybrid seed from three different maize donor genotypes after maternal haploid induction were used to test the capability of automated near-infrared transmission spectroscopy to individually differentiate haploid from hybrid seeds. Using a two-step chemometric analysis in which the seeds were first classified according to genotype and then the haploid or hybrid status was determined proved to be the most successful approach. This approach allowed 11 of 13 haploid and 25 of 25 hybrid kernels to be correctly identified from a mixture that included seeds of all the genotypes.

Jones, Roger W.; Reinot, Tonu; Frei, Ursula K.; Tseng, Yichia; Lbberstedt, Thomas; McClelland, John F.

2012-04-01T23:59:59.000Z

151

Handling Ambiguity via Input-Output Kernel Learning Xinxing Xu Ivor W. Tsang Dong Xu  

E-Print Network [OSTI]

of Computer Engineering, Nanyang Technological University, Singapore xuxi0006@ntu.edu.sg IvorTsang@ntu.edu.sg dongxu@ntu.edu.sg Abstract--Data ambiguities exist in many data mining and machine learning applications the effectiveness of our proposed IOKL framework. Keywords-Group Multiple Kernel Learning; Input-Output Kernel

Tsang Wai Hung "Ivor"

152

Graph Kernels Based on Relevant Patterns and Cycle Information for Chemoinformatics  

E-Print Network [OSTI]

by combining relevant cycles and newly discovered cycles. Horv´ath showed that a low number of iterationsGraph Kernels Based on Relevant Patterns and Cycle Information for Chemoinformatics Benoit Ga of view, graph kernels provide a nice framework for combining these two fields. We present in this paper

Boyer, Edmond

153

HW Componentizing Kernel: A New Approach to address the Mega Complexity of Future Automotive CPS  

E-Print Network [OSTI]

HW Componentizing Kernel: A New Approach to address the Mega Complexity of Future Automotive CPS of CPS (Cyber Physical System). However, current software development process in the automotive industry automotive software devel- opment process in the perspective of CPS and proposes a new kernel-based approach

Rajkumar, Ragunathan "Raj"

154

STEIN'S METHOD, HEAT KERNEL, AND TRACES OF POWERS OF ELEMENTS OF COMPACT LIE GROUPS  

E-Print Network [OSTI]

STEIN'S METHOD, HEAT KERNEL, AND TRACES OF POWERS OF ELEMENTS OF COMPACT LIE GROUPS JASON FULMAN Abstract. Combining Stein's method with heat kernel techniques, we show that the trace of the jth power There is a large literature on the traces of powers of random elements of compact Lie groups. One of the earliest

Fulman, Jason

155

STEIN'S METHOD, HEAT KERNEL, AND TRACES OF POWERS OF ELEMENTS OF COMPACT LIE GROUPS  

E-Print Network [OSTI]

STEIN'S METHOD, HEAT KERNEL, AND TRACES OF POWERS OF ELEMENTS OF COMPACT LIE GROUPS JASON FULMAN Abstract. Combining Stein's method with heat kernel techniques, we show that the trace of the jth power on the traces of powers of random elements of compact Lie groups. One of the earliest results is due to Diaconis

Fulman, Jason

156

Cultivar and E-Beam irradiation effects on phytochemical content and antioxidant properties of pecan kernels  

E-Print Network [OSTI]

. Kernels from the same cultivar but different location differed in their fatty acid composition but had similar TP. Irradiation of Kanza and Desirable kernels with 1.5 and 3.0 kGy had no detrimental effects on AC and TP by the end of experiments...

Villarreal Lozoya, Jose Emilio

2009-05-15T23:59:59.000Z

157

On ascertaining inductively the dimension of the joint kernel of certain commuting linear operators  

E-Print Network [OSTI]

On ascertaining inductively the dimension of the joint kernel of certain commuting linear operators), and a collection f`xgx2X of commuting linear maps on some linear space, the family of linear operators whose joint DMS-9000053, DMS-9102857. i #12;proposed running head: dimension of joint kernels Proofs should

Shen, Zuowei

158

Frontier estimation via kernel regression on high power-transformed data  

E-Print Network [OSTI]

Frontier estimation via kernel regression on high power-transformed data S´ephane Girard(1 Abstract We present a new method for estimating the frontier of a multidimensional sample. The estimator is illustrated on some finite sample situations. Keywords: kernel estimator, power-transform, frontier estimation

Paris-Sud XI, Université de

159

Uniform strong consistency of a frontier estimator using kernel regression on high order moments  

E-Print Network [OSTI]

Uniform strong consistency of a frontier estimator using kernel regression on high order moments order moments estimator of the frontier of a random pair in- troduced by Girard, S., Guillou, A., Stupfler, G. (2012). Frontier estimation with kernel regression on high order moments. It is shown

Paris-Sud XI, Université de

160

TORCH Computational Reference Kernels - A Testbed for Computer Science Research  

SciTech Connect (OSTI)

For decades, computer scientists have sought guidance on how to evolve architectures, languages, and programming models in order to improve application performance, efficiency, and productivity. Unfortunately, without overarching advice about future directions in these areas, individual guidance is inferred from the existing software/hardware ecosystem, and each discipline often conducts their research independently assuming all other technologies remain fixed. In today's rapidly evolving world of on-chip parallelism, isolated and iterative improvements to performance may miss superior solutions in the same way gradient descent optimization techniques may get stuck in local minima. To combat this, we present TORCH: A Testbed for Optimization ResearCH. These computational reference kernels define the core problems of interest in scientific computing without mandating a specific language, algorithm, programming model, or implementation. To compliment the kernel (problem) definitions, we provide a set of algorithmically-expressed verification tests that can be used to verify a hardware/software co-designed solution produces an acceptable answer. Finally, to provide some illumination as to how researchers have implemented solutions to these problems in the past, we provide a set of reference implementations in C and MATLAB.

Kaiser, Alex; Williams, Samuel Webb; Madduri, Kamesh; Ibrahim, Khaled; Bailey, David H.; Demmel, James W.; Strohmaier, Erich

2010-12-02T23:59:59.000Z

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Jitk: A Trustworthy In-Kernel Interpreter Infrastructure Xi Wang, David Lazar, Nickolai Zeldovich, Adam Chlipala, Zachary Tatlock  

E-Print Network [OSTI]

]. Interpreters are also used outside of kernels, such as in Bitcoin's transaction scripting [2]. As an example

Chlipala, Adam

162

SimpleNPKL : Simple Non-Parametric Kernel Learning Jinfeng Zhuang ZHUA0016@NTU.EDU.SG  

E-Print Network [OSTI]

SimpleNPKL : Simple Non-Parametric Kernel Learning Jinfeng Zhuang ZHUA0016@NTU.EDU.SG Ivor W. Tsang IVORTSANG@NTU.EDU.SG Steven C.H. Hoi CHHOI@NTU.EDU.SG School of Computer Engineering, Nanyang Technological-of-the-art perfor- mance. The choice of an effective kernel plays a crucial role in many kernel based machine

Tsang Wai Hung "Ivor"

163

Figure 1. Block diagram of the turbo decoder. A Memory-Reduced Log-MAP Kernel for Turbo Decoder  

E-Print Network [OSTI]

Figure 1. Block diagram of the turbo decoder. A Memory-Reduced Log-MAP Kernel for Turbo Decoder--Generally, the Log-MAP kernel of the turbo decoding consume large memories in hardware implement- tation of the turbo decoder is implemented to verify the proposed memory-reduced Log- MAP kernel in 3.04?3.04mm2 core

Hung, Shih-Hao

164

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

165

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

166

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

167

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

168

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities. In support of national defense initiatives...

169

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

170

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

171

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

172

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

173

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

174

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

175

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

176

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

177

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

178

FABRICATION OF URANIUM OXYCARBIDE KERNELS AND COMPACTS FOR HTR FUEL  

SciTech Connect (OSTI)

As part of the program to demonstrate tristructural isotropic (TRISO)-coated fuel for the Next Generation Nuclear Plant (NGNP), Advanced Gas Reactor (AGR) fuel is being irradiation tested in the Advanced Test Reactor (ATR) at Idaho National Laboratory (INL). This testing has led to improved kernel fabrication techniques, the formation of TRISO fuel particles, and upgrades to the overcoating, compaction, and heat treatment processes. Combined, these improvements provide a fuel manufacturing process that meets the stringent requirements associated with testing in the AGR experimentation program. Researchers at Idaho National Laboratory (INL) are working in conjunction with a team from Babcock and Wilcox (B&W) and Oak Ridge National Laboratory (ORNL) to (a) improve the quality of uranium oxycarbide (UCO) fuel kernels, (b) deposit TRISO layers to produce a fuel that meets or exceeds the standard developed by German researches in the 1980s, and (c) develop a process to overcoat TRISO particles with the same matrix material, but applies it with water using equipment previously and successfully employed in the pharmaceutical industry. A primary goal of this work is to simplify the process, making it more robust and repeatable while relying less on operator technique than prior overcoating efforts. A secondary goal is to improve first-pass yields to greater than 95% through the use of established technology and equipment. In the first test, called AGR-1, graphite compacts containing approximately 300,000 coated particles were irradiated from December 2006 to November 2009. The AGR-1 fuel was designed to closely replicate many of the properties of German TRISO-coated particles, thought to be important for good fuel performance. No release of gaseous fission product, indicative of particle coating failure, was detected in the nearly 3-year irradiation to a peak burn up of 19.6% at a time-average temperature of 10381121C. Before fabricating AGR-2 fuel, each fabrication process was improved and changed. Changes to the kernel fabrication process included replacing the carbon black powder feed with a surface-modified carbon slurry and shortening the sintering schedule. AGR-2 TRISO particles were produced in a 6-inch diameter coater using a charge size about 21-times that of the 2-inch diameter coater used to coat AGR-1 particles. The compacting process was changed to increase matrix density and throughput by increasing the temperature and pressure of pressing and using a different type of press. AGR-2 fuel began irradiation in the ATR in late spring 2010.

Dr. Jeffrey A. Phillips; Eric L. Shaber; Scott G. Nagley

2012-10-01T23:59:59.000Z

179

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

180

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop  

E-Print Network [OSTI]

Over the last decade modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. The Stuxnet worm of 2010 against a particular Siemens PLC is a unique example for a sophisticated attack against control systems [1]. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data being ...

Lders, S

2011-01-01T23:59:59.000Z

182

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

183

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

184

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

185

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

186

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

187

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

188

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

189

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

190

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

191

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

192

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

193

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

194

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

195

Kernel infection of Bluebonnet 50 rice by Helminthosporium oryzae and its effect on yield and quality  

E-Print Network [OSTI]

. CHAPTER II REVIEW OF LITERATURE The fungus, Helminthos orium ~or zae Breda de Haan, was described at the begi. nning of the twentieth century (1). It was associated with necro+ic spots on t?e leaves of cultivated rice. It is now known that H. ~or zae... and regular compared to kernels (not parboiled) middle right (Fig. 1. B). Discoloration showed various shades of brown lesions girdling the kernels. In advanced stages, the entire kernels were into'ved, resulting in black mass. 21 Some of the parbo! led...

Fazli, Syed Fazal Imam

1964-01-01T23:59:59.000Z

196

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

197

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

198

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

199

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

200

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Chisel: Reliability-and Accuracy-Aware Optimization of Approximate Computational Kernels  

E-Print Network [OSTI]

Chisel: Reliability- and Accuracy-Aware Optimization of Approximate Computational Kernels Sasa produces and the corre- sponding fully accurate result. The reliability of the computation performance, exhibit reduced reliability and/or accuracy. We present Chisel, a system for reliability

Suresh, Subra

202

Kernel Level Energy-Efficient 3G Background Traffic Shaper for Android Smartphones  

E-Print Network [OSTI]

Kernel Level Energy-Efficient 3G Background Traffic Shaper for Android Smartphones Ekhiotz Jon energy-efficient, the lack of energy aware- ness on the software front is becoming all too apparent

203

Systematics of the Relationship between Vacuum Energy Calculations and Heat Kernel Coefficients  

E-Print Network [OSTI]

Casimir energy is a nonlocal effect; its magnitude cannot be deduced from heat kernel expansions, even those including the integrated boundary terms. On the other hand, it is known that the divergent terms in the regularized (but not yet renormalized) total vacuum energy are associated with the heat kernel coefficients. Here a recent study of the relations among the eigenvalue density, the heat kernel, and the integral kernel of the operator $e^{-t\\sqrt{H}}$ is exploited to characterize this association completely. Various previously isolated observations about the structure of the regularized energy emerge naturally. For over 20 years controversies have persisted stemming from the fact that certain (presumably physically meaningful) terms in the renormalized vacuum energy density in the interior of a cavity become singular at the boundary and correlate to certain divergent terms in the regularized total energy. The point of view of the present paper promises to help resolve these issues.

S. A. Fulling

2003-04-03T23:59:59.000Z

204

Risk Bounds for Regularized Least-squares Algorithm with Operator-valued kernels  

E-Print Network [OSTI]

We show that recent results in [3] on risk bounds for regularized least-squares on reproducing kernel Hilbert spaces can be straightforwardly extended to the vector-valued regression setting. We first briefly introduce ...

Vito, Ernesto De

2005-05-16T23:59:59.000Z

205

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

206

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

207

Estimating the Bias of Local Polynomial Approximations Using the Peano Kernel  

SciTech Connect (OSTI)

These presentation visuals define local polynomial approximations, give formulas for bias and random components of the error, and express bias error in terms of the Peano kernel. They further derive constants that give figures of merit, and show the figures of merit for 3 common weighting functions. The Peano kernel theorem yields estimates for the bias error for local-polynomial-approximation smoothing that are superior in several ways to the error estimates in the current literature.

Blair, J., and Machorro, E.

2012-03-22T23:59:59.000Z

208

The architecture of a plug-and-play kernel for oilfield software applications  

SciTech Connect (OSTI)

It is now common practice for engineers to use PC software to design and evaluate oilfield services. Rapidly changing technology in PC software has made it necessary for organizations to release new applications quickly to remain competitive. The authors designed a plug-and-play kernel for the computer aided design and evaluation (CADE) applications to reduce development time and time to market. The paper discusses the kernel used in the CADE software in detail.

Ward, V.L.; Seaton, C.P. [Schlumberger Dowell, Tulsa, OK (United States)

1996-12-01T23:59:59.000Z

209

System Response Kernel Calculation for List-mode Reconstruction in Strip PET Detector  

E-Print Network [OSTI]

Reconstruction of the image in Positron Emission Tomographs (PET) requires the knowledge of the system response kernel which describes the contribution of each pixel (voxel) to each tube of response (TOR). This is especially important in list-mode reconstruction systems, where an efficient analytical approximation of such function is required. In this contribution, we present a derivation of the system response kernel for a novel 2D strip PET.

Bia?as, P; Strzelecki, A; Bednarski, T; Czerwi?ski, E; Kap?on, ?; Kochanowski, A; Korcyl, G; Kowalski, P; Kozik, T; Krzemie?, W; Molenda, M; Moskal, P; Nied?wiecki, Sz; Pa?ka, M; Pawlik, M; Raczy?ski, L; Rudy, Z; Salabura, P; Sharma, N G; Silarski, M; S?omski, A; Smyrski, J; Wi?licki, W; Zieli?ski, M

2013-01-01T23:59:59.000Z

210

Grid polygons from permutations and their enumeration by the kernel method  

E-Print Network [OSTI]

A grid polygon is a polygon whose vertices are points of a grid. We define an injective map between permutations of length n and a subset of grid polygons on n vertices, which we call consecutive-minima polygons. By the kernel method, we enumerate sets of permutations whose consecutive-minima polygons satisfy specific geometric conditions. We deal with 2-variate and 3-variate generating functions involving derivatives, cases which are not routinely solved by the kernel method.

Toufik Mansour; Simone Severini

2006-03-09T23:59:59.000Z

211

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

212

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

213

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

214

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

215

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

216

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

217

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

218

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

219

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

220

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

222

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

223

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

224

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

225

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

226

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

227

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

228

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

229

Physics Experiments and Abstract Harmonic Analysis: A Generalized Peano Kernel Theorem for Estimating Errors in Laser Interferometry  

SciTech Connect (OSTI)

This slide-show discusses the use of the Local Polynomial Approximation (LPA) to smooth signals from photonic Doppler velocimetry (PDV) applying a generalized Peano kernel theorem.

Luttman, A.

2012-10-08T23:59:59.000Z

230

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

231

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

232

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

233

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

234

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

235

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

236

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

237

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

238

PySKI: THE PYTHON SPARSE KERNEL INTERFACE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - SeptemberMicroneedlesAdvancedJanuary 13,Putting veterans to work PuttingThis

239

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

240

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

242

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

243

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

244

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

245

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

246

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

247

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

248

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

249

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

250

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

251

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

252

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

253

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

254

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

255

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

256

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

257

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

258

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

259

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

260

Carbothermic Synthesis of 820 m UN Kernels: Literature Review, Thermodynamics, Analysis, and Related Experiments  

SciTech Connect (OSTI)

The U.S. Department of Energy is considering a new nuclear fuel that would be less susceptible to ruptures during a loss-of-coolant accident. The fuel would consist of tristructural isotropic coated particles with large, dense uranium nitride (UN) kernels. This effort explores many factors involved in using gel-derived uranium oxide-carbon microspheres to make large UN kernels. Analysis of recent studies with sufficient experimental details is provided. Extensive thermodynamic calculations are used to predict carbon monoxide and other pressures for several different reactions that may be involved in conversion of uranium oxides and carbides to UN. Experimentally, the method for making the gel-derived microspheres is described. These were used in a microbalance with an attached mass spectrometer to determine details of carbothermic conversion in argon, nitrogen, or vacuum. A quantitative model is derived from experiments for vacuum conversion to an uranium oxide-carbide kernel.

Lindemer, Terrence [Harbach Engineering and Solutions] [Harbach Engineering and Solutions; Voit, Stewart L [ORNL] [ORNL; Silva, Chinthaka M [ORNL] [ORNL; Besmann, Theodore M [ORNL] [ORNL; Hunt, Rodney Dale [ORNL] [ORNL

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Architectural Repair of Open Source Software John B. Tran, Michael W. Godfrey, Eric H.S. Lee, and Richard C. Holt  

E-Print Network [OSTI]

large open source systems (the Linux operating system kernel and the VIM text editor) to aid program: the Linux operating system kernel [3, 1] and the VIM text editor [5]. We analyzed their architectures experiences with the repair of the Linux and VIM ar- chitectures. A description of related work is presented

Godfrey, Michael W.

262

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

263

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

264

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

265

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

266

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

267

Detecting Generalized Synchronization of Chaotic Dynamical Systems: A Kernel-based Method and Choice of Its Parameter  

E-Print Network [OSTI]

An approach based on the kernel methods for capturing the nonlinear interdependence between two signals is introduced. It is demonstrated that the proposed approach is useful for characterizing generalized synchronization with a successful simple example. An attempt to choose an optimal kernel parameter based on cross validation is also discussed.

Hiromichi Suetani; Yukito Iba; Kazuyuki Aihara

2005-07-21T23:59:59.000Z

268

The congruence kernel of an arithmetic lattice in a rank one algebraic group over a local field  

E-Print Network [OSTI]

is finite. Otherwise the CSP has an essentially negative answer. The principal result in [S1] is that-called congruence subgroup problem or CSP, has attracted a great deal of attention since the 19th century-)congruence kernel of G. In his terminology [S1] the CSP for this group has an affirmative answer if this kernel

Zalesskii, Pavel

269

RTK-Spec TRON: A Simulation Model of an ITRON Based RTOS Kernel in SystemC  

E-Print Network [OSTI]

RTK-Spec TRON: A Simulation Model of an ITRON Based RTOS Kernel in SystemC M. AbdElSalam Hassan of RTOS simulation models in a System Level Design Language (SLDL) like SystemC. We describe these constructs and show how they are used to build a simulation model of an RTOS kernel targeting the µ- ITRON OS

Boyer, Edmond

270

Non-parallel semi-supervised classification based on kernel spectral Siamak Mehrkanoon and Johan A. K. Suykens  

E-Print Network [OSTI]

-parallel hyper- planes were determined via solving two generalized eigen- value problem and the method is termedNon-parallel semi-supervised classification based on kernel spectral clustering Siamak Mehrkanoon and Johan A. K. Suykens Abstract-- In this paper, a non-parallel semi-supervised al- gorithm based on kernel

271

Asymptotic Integral Kernel for Ensembles of Random Normal Matrix with Radial Potentials  

E-Print Network [OSTI]

We use the steepest descents method to study the integral kernel of a family of normal random matrix ensembles with eigenvalue distribution P_{N}(z_{1},...,z_{N}) = Z_{N}^{-1} e^{-N\\Sigma_{i=1}^{N}V_{\\alpha}(z_{i})} \\Pi_{1\\leqikernel for the classical Segal--Bargmann space.

Alexei M. Veneziani; Tiago Pereira; Domingos H. U. Marchetti

2011-06-23T23:59:59.000Z

272

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

273

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

274

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

275

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

276

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

277

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

278

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

279

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

280

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

282

U-070:Redhat krb5 Critical Security Update | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Hat Enterprise Linux WS (v. 4) ABSTRACT: Vulnerability can be exploited by malicious people to compromise a vulnerable system. REFERENCE LINKS: RHSA-2011:1851-2...

283

TEMPERED OPERATORS AND THE HEAT KERNEL AND COMPLEX POWERS OF ELLIPTIC PSEUDODIFFERENTIAL OPERATORS  

E-Print Network [OSTI]

TEMPERED OPERATORS AND THE HEAT KERNEL AND COMPLEX POWERS OF ELLIPTIC PSEUDODIFFERENTIAL OPERATORS operator and complex powers of b-pseudodi#27;erential operators, as the heat operator and complex powers are the Laplace and Mellin transforms, respectively, of the resolvent. The heat operator and complex powers

Loya, Paul

284

One-rank interaction kernel of the two-nucleon system for medium and high energies  

E-Print Network [OSTI]

A new version of the separable kernel of the nucleon-nucleon interaction in the Bethe-Salpeter approach is presented. The phase shifts are fitted to recent experimental data for singlet and uncoupled triplet partial waves of the neutron-proton scattering with total angular momenta J=0,1. The results are compared with other model calculations.

S. G. Bondarenko; V. V. Burov; W-Y. Pauchy Hwang; E. P. Rogochaya

2008-06-04T23:59:59.000Z

285

IEEE SIGNAL PROCESSING MAGAZINE 2013 1 Kernel Multivariate Analysis Framework for  

E-Print Network [OSTI]

IEEE SIGNAL PROCESSING MAGAZINE 2013 1 Kernel Multivariate Analysis Framework for Supervised in the literature collectively grouped under the field of Multivariate Analysis (MVA). This paper provides a uniform Correlation Analysis (CCA) and Orthonormalized PLS (OPLS), as well as their non- linear extensions derived

Camps-Valls, Gustavo

286

Least Squares Support Vector Machines for Kernel CCA in Nonlinear State-Space Identification  

E-Print Network [OSTI]

with multivariable input and output signals. It is of practical interest to be able to determine a state-space for linear time-invariant systems well-established state-space identification methods are available (Ljung to estimate the state-space representation. In this paper we use kernel canonical correlation analysis (KCCA

287

Stochastic Mixed-Signal VLSI Architecture for High-Dimensional Kernel Machines  

E-Print Network [OSTI]

Stochastic Mixed-Signal VLSI Architecture for High-Dimensional Kernel Machines Roman Genov and Gert roman,gert¡ @jhu.edu Abstract A mixed-signal paradigm is presented for high-resolution parallel inner processing. At the core of the externally digital architecture is a high-density, low-power analog array

Cauwenberghs, Gert

288

Contem porary M athem atics Heat Kernels measures and Infinite dimensional analysis.  

E-Print Network [OSTI]

Contem porary M athem atics Heat Kernels measures and Infinite dimensional analysis. Bruce K 0202939. c°0000 (copyright holder) 1 2 BRUCE K. DRIVER Section 3 is devoted to a description, random walks and analysis to manifolds and graphs" held at IHP in Paris. 2. Finite Dimensional Heat

Driver, Bruce

289

Polar Cloud Detection using Satellite Data with Analysis and Application of Kernel Learning Algorithms  

E-Print Network [OSTI]

Abstract Polar Cloud Detection using Satellite Data with Analysis and Application of Kernel Professor Bin Yu, Chair Clouds play a major role in Earth's climate and cloud detection is a crucial step climate model studies. Cloud detection is particularly difficult in the snow- and ice-covered polar

Shi, Tao

290

Unified Convolutional/Turbo Decoder Architecture Design Based on Triple-Mode MAP/VA Kernel  

E-Print Network [OSTI]

Unified Convolutional/Turbo Decoder Architecture Design Based on Triple-Mode MAP/VA Kernel Fan convolutional/ turbo decoder design. According to the triple-mode MAP/VA timing chart and by merging some similar modules in both the Viterbi decoder and the log-MAP turbo code decoder, we build one unified

Hung, Shih-Hao

291

Path Integral Control by Reproducing Kernel Hilbert Space Embedding Konrad Rawlik  

E-Print Network [OSTI]

of stochastic optimal control problems, of the so called path integral form, into reproducing kernel Hilbert efficiency, are provided. 1 Introduction While solving general non-linear stochastic optimal con- trol (SOC new sam- ples [Theodorou et al., 2010; 2009]. Additionally, the ap- proach remains model

Vijayakumar, Sethu

292

IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Online Kernel-based Learning  

E-Print Network [OSTI]

an application in task-space tracking control of redundant robots possible. The model parametrization furtherIEEE TRANSACTIONS ON NEURAL NETWORKS 1 Online Kernel-based Learning for Task-Space Tracking Robot Control Duy Nguyen-Tuong, Jan Peters Abstract--Task-space control of redundant robot systems based

293

Definition RX Evaluate Kernels K-2d K-1d Change By definition undefined  

E-Print Network [OSTI]

Definition RX Evaluate Kernels K-2d K-1d Change By definition undefined Adventures in anomaly Alamos National Laboratory Research supported by the United States Department of Energy through the Los Alamos Laboratory Directed Research and Development (LDRD) Program. #12;Theiler LA-UR-14-24429 Definition

Theiler, James

294

Selection and Properties of Alternative Forming Fluids for TRISO Fuel Kernel Production  

SciTech Connect (OSTI)

Current Very High Temperature Reactor (VHTR) designs incorporate TRi-structural ISOtropic (TRISO) fuel, which consists of a spherical fissile fuel kernel surrounded by layers of pyrolytic carbon and silicon carbide. An internal sol-gel process forms the fuel kernel using wet chemistry to produce uranium oxyhydroxide gel spheres by dropping a cold precursor solution into a hot column of trichloroethylene (TCE). Over time, gelation byproducts inhibit complete gelation, and the TCE must be purified or discarded. The resulting TCE waste stream contains both radioactive and hazardous materials and is thus considered a mixed hazardous waste. Changing the forming fluid to a non-hazardous alternative could greatly improve the economics of TRISO fuel kernel production. Selection criteria for a replacement forming fluid narrowed a list of ~10,800 chemicals to yield ten potential replacement forming fluids: 1-bromododecane, 1- bromotetradecane, 1-bromoundecane, 1-chlorooctadecane, 1-chlorotetradecane, 1-iododecane, 1-iodododecane, 1-iodohexadecane, 1-iodooctadecane, and squalane. The density, viscosity, and surface tension for each potential replacement forming fluid were measured as a function of temperature between 25 C and 80 C. Calculated settling velocities and heat transfer rates give an overall column height approximation. 1-bromotetradecane, 1-chlorooctadecane, and 1-iodododecane show the greatest promise as replacements, and future tests will verify their ability to form satisfactory fuel kernels.

Doug Marshall; M. Baker; J. King; B. Gorman

2013-01-01T23:59:59.000Z

295

A Reproducing Kernel Hilbert Space framework for Spike Train Signal Processing  

E-Print Network [OSTI]

A Reproducing Kernel Hilbert Space framework for Spike Train Signal Processing Ant´onio R. C. Paiva describe and manipulate spike trains. The main idea is the definition of inner products to allow spike train signal processing from basic principles while incorporating their statistical description as point

Utah, University of

296

An improved ECG-Derived Respiration Method using Kernel Principal Component Analysis  

E-Print Network [OSTI]

An improved ECG-Derived Respiration Method using Kernel Principal Component Analysis Devy Widjaja1) of heart beats generates well-performing ECG- derived respiratory signals (EDR). This study aims at im in the extraction of a respiratory signal from single lead ECGs. 1. Introduction Respiration is often jointly

297

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

298

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

299

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

300

Dye filled security seal  

DOE Patents [OSTI]

A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

Wilson, Dennis C. W. (Tijeras, NM)

1982-04-27T23:59:59.000Z

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

302

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

303

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

304

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

305

Security | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

306

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

307

Energy Security Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

308

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

309

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

310

Natlonal Nuclear Security Admlnlstratlon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

311

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

312

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

313

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

314

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

315

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

316

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

317

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

318

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

319

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

320

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

Zhao, Yuxiao

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Office of Environmental Management (EM)

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

322

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Office of Environmental Management (EM)

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

323

2014 Headquarters Facilities Master Security Plan - Chapter 1...  

Office of Environmental Management (EM)

, Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

324

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Office of Environmental Management (EM)

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

325

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Office of Environmental Management (EM)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

326

PROPERTIES OF A SOLAR FLARE KERNEL OBSERVED BY HINODE AND SDO  

SciTech Connect (OSTI)

Flare kernels are compact features located in the solar chromosphere that are the sites of rapid heating and plasma upflow during the rise phase of flares. An example is presented from a M1.1 class flare in active region AR 11158 observed on 2011 February 16 07:44 UT for which the location of the upflow region seen by EUV Imaging Spectrometer (EIS) can be precisely aligned to high spatial resolution images obtained by the Atmospheric Imaging Assembly (AIA) and Helioseismic and Magnetic Imager (HMI) on board the Solar Dynamics Observatory (SDO). A string of bright flare kernels is found to be aligned with a ridge of strong magnetic field, and one kernel site is highlighted for which an upflow speed of Almost-Equal-To 400 km s{sup -1} is measured in lines formed at 10-30 MK. The line-of-sight magnetic field strength at this location is Almost-Equal-To 1000 G. Emission over a continuous range of temperatures down to the chromosphere is found, and the kernels have a similar morphology at all temperatures and are spatially coincident with sizes at the resolution limit of the AIA instrument ({approx}<400 km). For temperatures of 0.3-3.0 MK the EIS emission lines show multiple velocity components, with the dominant component becoming more blueshifted with temperature from a redshift of 35 km s{sup -1} at 0.3 MK to a blueshift of 60 km s{sup -1} at 3.0 MK. Emission lines from 1.5-3.0 MK show a weak redshifted component at around 60-70 km s{sup -1} implying multi-directional flows at the kernel site. Significant non-thermal broadening corresponding to velocities of Almost-Equal-To 120 km s{sup -1} is found at 10-30 MK, and the electron density in the kernel, measured at 2 MK, is 3.4 Multiplication-Sign 10{sup 10} cm{sup -3}. Finally, the Fe XXIV {lambda}192.03/{lambda}255.11 ratio suggests that the EIS calibration has changed since launch, with the long wavelength channel less sensitive than the short wavelength channel by around a factor two.

Young, P. R. [College of Science, George Mason University, 4400 University Drive, Fairfax, VA 22030 (United States)] [College of Science, George Mason University, 4400 University Drive, Fairfax, VA 22030 (United States); Doschek, G. A.; Warren, H. P. [Naval Research Laboratory, 4555 Overlook Avenue SW, Washington, DC 20375 (United States)] [Naval Research Laboratory, 4555 Overlook Avenue SW, Washington, DC 20375 (United States); Hara, H. [National Astronomical Observatory of Japan/NINS, 2-21-1 Osawa, Mitaka, Tokyo 181-8588 (Japan)] [National Astronomical Observatory of Japan/NINS, 2-21-1 Osawa, Mitaka, Tokyo 181-8588 (Japan)

2013-04-01T23:59:59.000Z

327

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

328

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

329

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

Settles, Gary S.

330

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

331

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

332

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

333

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

334

Kernel for a Semantic Learning Platform with adapted suggestions Ioan SZILAGYI, Radu BALOG-CRIAN, Ioan ROXIN, Ana ROXIN  

E-Print Network [OSTI]

Kernel for a Semantic Learning Platform with adapted suggestions Ioan SZILAGYI, Radu BALOG {ioan.szilagyi; radu.balog-crisan; ioan.roxin}@univ-fcomte.fr Abstract -- In the context of personalized

Boyer, Edmond

335

IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 14, NO. 4, JULY 2006 1267 Embedded Kernel Eigenvoice Speaker Adaptation  

E-Print Network [OSTI]

-Wing Mak, Member, IEEE, Roger Wend-Huu Hsiao, Student Member, IEEE, Simon Ka-Lung Ho, and James T. Kwok using kernel principal component analysis. A new speaker model is then constructed as a linear

Kwok, James Tin-Yau

336

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

337

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

338

Departmental Personnel Security- Policy and Procedures  

Broader source: Energy.gov [DOE]

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

339

Heat Kernel Asymptotic Expansion on Unbounded Domains with Polynomially Confining Potentials  

E-Print Network [OSTI]

In this paper we analyze the small-t asymptotic expansion of the trace of the heat kernel associated with a Laplace operator endowed with a spherically symmetric polynomially confining potential on the unbounded, d-dimensional Euclidean space. To conduct this study, the trace of the heat kernel is expressed in terms of its partially resummed form which is then represented as a Mellin-Barnes integral. A suitable contour deformation then provides, through the use of Cauchy's residue theorem, closed formulas for the coefficients of the asymptotic expansion. The general expression for the asymptotic expansion, valid for any dimension and any polynomially confining potential, is then specialized to two particular cases: the general quartic and sestic oscillator potentials.

Guglielmo Fucci

2014-05-14T23:59:59.000Z

340

Stein's method, heat kernel, and traces of powers of elements of compact Lie groups  

E-Print Network [OSTI]

Combining Stein's method with heat kernel techniques, we show that the trace of the jth power of an element of U(n,C), USp(n,C) or SO(n,R) has a normal limit with error term of order j/n. In contrast to previous works, here j may be growing with n. The technique should prove useful in the study of the value distribution of approximate eigenfunctions of Laplacians.

Jason Fulman

2010-05-07T23:59:59.000Z

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Effect of Pre and Post-Harvest Treatments on Characteristics of Pawnee Pecan Kernels  

E-Print Network [OSTI]

, and bright color (Herrera, 2005). Color, flavor, and appearance were maintained for 25 years when kernels were stored at -20 C in hermetically sealed containers (Hao et al., 1991). Although freezing or refrigeration are suitable methods for prolonged.... This may be attributed to the effect that refrigeration had on the nuts, which were placed in the refrigerator for 11 weeks prior to the 2nd shelling date. According to Herrera (2005), the greatest benefit of storing at nuts at a low temperature...

Mansur, Zainab J

2014-04-17T23:59:59.000Z

342

Heat kernel Coefficients and Divergencies of the Casimir Energy for the Dispersive Sphere  

E-Print Network [OSTI]

The first heat kernel coefficients are calculated for a dispersive ball whose permittivity at high frequency differs from unity by inverse powers of the frequency. The corresponding divergent part of the vacuum energy of the electromagnetic field is given and ultraviolet divergencies are seen to be present. Also in a model where the number of atoms is fixed the pressure exhibits infinities. As a consequence, the ground-state energy for a dispersive dielectric ball cannot be interpreted easily.

M. Bordag; K. Kirsten

2001-10-24T23:59:59.000Z

343

Vacuum energy, spectral determinant and heat kernel asymptotics of graph Laplacians with general vertex matching conditions  

E-Print Network [OSTI]

We consider Laplace operators on metric graphs, networks of one-dimensional line segments (bonds), with matching conditions at the vertices that make the operator self-adjoint. Such quantum graphs provide a simple model of quantum mechanics in a classically chaotic system with multiple scales corresponding to the lengths of the bonds. For graph Laplacians we briefly report results for the spectral determinant, vacuum energy and heat kernel asymptotics of general graphs in terms of the vertex matching conditions.

J. M. Harrison; K. Kirsten

2010-03-16T23:59:59.000Z

344

Evaluation of sintering effects on SiC incorporated UO2 kernels under Ar and Ar-4%H2 environments  

SciTech Connect (OSTI)

Silicon carbide (SiC) is suggested as an oxygen getter in UO2 kernels used for TRISO particle fuels to lower oxygen potential and prevent kernel migration during irradiation. Scanning electron microscopy and X-ray diffractometry analyses performed on sintered kernels verified that internal gelation process can be used to incorporate SiC in urania fuel kernels. Sintering in either Ar or Ar-4%H2 at 1500 C lowered the SiC content in the UO2 kernels to some extent. Formation of UC was observed as the major chemical phase in the process, while other minor phases such as U3Si2C2, USi2, U3Si2, and UC2 were also identified. UC formation was presumed to be occurred by two reactions. The first was the SiC reaction with its protective SiO2 oxide layer on SiC grains to produce volatile SiO and free carbon that subsequently reacted with UO2 to form UC. The second process was direct UO2 reaction with SiC grains to form SiO, CO, and UC, especially in Ar-4%H2. A slightly higher density and UC content was observed in the sample sintered in Ar-4%H2, but the use of both atmospheres produced kernels with ~95% of theoretical density. It is suggested that incorporating CO in the sintering gas would prevent UC formation and preserve the initial SiC content.

Silva, Chinthaka M [ORNL] [ORNL; Lindemer, Terrence [Harbach Engineering and Solutions] [Harbach Engineering and Solutions; Hunt, Rodney Dale [ORNL] [ORNL; Collins, Jack Lee [ORNL] [ORNL; Terrani, Kurt A [ORNL] [ORNL; Snead, Lance Lewis [ORNL] [ORNL

2013-01-01T23:59:59.000Z

345

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

346

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

347

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

348

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

349

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

350

Preliminary Notice of Violation, National Security Technologies...  

Office of Environmental Management (EM)

Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

351

Safety and Security Enforcement Process Overview  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

352

Safety and Security Enforcement Coordinator Handbook  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

353

Harold Washington Social Security Administration (SSA) Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

354

National Securities Technologies _NSTec_ Livermore Operations...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

355

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

356

National Nuclear Security Administration Appropriation and Program...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

357

Independent Oversight Review, Nevada National Security Site,...  

Broader source: Energy.gov (indexed) [DOE]

and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

358

Automated Security Compliance Tool for the Cloud.  

E-Print Network [OSTI]

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

359

Independent Oversight Activity Report, Nevada National Security...  

Office of Environmental Management (EM)

Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

360

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

362

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

363

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Broader source: Energy.gov (indexed) [DOE]

8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

364

Enforcement Letter, Consolidated Nuclear Security, LLC | Department...  

Energy Savers [EERE]

security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

365

Security control methods for CEDR  

SciTech Connect (OSTI)

The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

Rotem, D.

1990-09-01T23:59:59.000Z

366

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

367

National Security Science July 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurityJuly

368

DF-479 SD-11 Directory Security: Mechanisms and Practicality  

E-Print Network [OSTI]

This document reviews security issues and identifies some of the specific measures required to achieve security.

North American Directory

369

updated 6/7/2007 Aerospace Security Certificate (21 Hours)  

E-Print Network [OSTI]

Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

Veiga, Pedro Manuel Barbosa

370

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

371

CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS  

E-Print Network [OSTI]

Security service is currently handled through a private security guard service contract, which provides

Olsen, Stephen L.

372

Cryptography and Data Security  

E-Print Network [OSTI]

The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

Dorothy E. Denning; Peter; J. Denning

1982-01-01T23:59:59.000Z

373

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

374

Meeting Federal Energy Security Requirements  

Broader source: Energy.gov [DOE]

Presentationgiven at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meetingdiscusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

375

Utility Security & Resiliency: Working Together  

Broader source: Energy.gov [DOE]

Presentationgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meetingdiscusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

376

Intrusion detection using secure signatures  

DOE Patents [OSTI]

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

377

Securities trading of concepts (STOC)  

E-Print Network [OSTI]

Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a securities trading ...

Dahan, Ely

378

Italy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryItaly and the United States of America are pleased...

379

Belgium | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Elio Di Rupo of Belgium on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryBelgium and the United States of America are pleased...

380

Forrestal Security and Safety Procedures  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

1983-02-02T23:59:59.000Z

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

382

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

383

Security Area Vouching and Piggybacking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

2000-06-05T23:59:59.000Z

384

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

385

Master Safeguards and Security Agreements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

1988-02-03T23:59:59.000Z

386

Cognitive Security for Personal Devices  

E-Print Network [OSTI]

Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

Greenstadt, Rachel

2008-03-17T23:59:59.000Z

387

Critical Infrastructure and Cyber Security  

E-Print Network [OSTI]

that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

2011-01-01T23:59:59.000Z

388

Office of Headquarters Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

389

Homeland Security Issues for Facilities  

E-Print Network [OSTI]

efficiency filters typically cause greater static pressure drop. Replacing air handling units to accept higher efficiency filters can be a major undertaking and expense. Besides offering some protection from biological and radiological agents, efficient..., security, surveillance, ventilation and filtration, and maintenance and training. The remainder of this discussion will focus primarily on occupant protection through HVAC system readiness and additional security measures. The aftermath of natural...

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

390

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

391

Extracting Security Control Requirements University of Tulsa  

E-Print Network [OSTI]

-component systems or systems of systems (SoSs) are difficult to verify because the security controls must to formulate functional requirements from security controls with SoSs as the target. The process starts accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

Gamble, R. F.

392

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

393

April 11, 2005 --Lecture 31 Computer Security  

E-Print Network [OSTI]

Science Policy Ancillaries #12;Security Planning Team Must represent all stakeholders, typically: Hardware

Jones, Douglas W.

394

Decision Support for Choice of Security  

E-Print Network [OSTI]

Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o analysis and trade-o tool BBN topology. (6) Rule set for how

Langseth, Helge

395

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?  

E-Print Network [OSTI]

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

Qin, Xiao

396

Cyber Security Companies, governments, and consumers depend on secure and reliable  

E-Print Network [OSTI]

Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

Hill, Wendell T.

397

Cyber Security and Resilient Systems  

SciTech Connect (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

398

1. The OSP Electronic Proposal Clearance Form works with Internet Explorer, Chrome, Firefox, and Safari browsers on Windows, Mac OS, and Linux.  

E-Print Network [OSTI]

that new employees add or verify the address using the utility at MSU MyInfo / Secured Area / Personal address, ospepcf.donotreply@montana.edu , in the Safe Senders list in your email program so messages do can use the ITC utility, Change Passwords Click here to go to the Electronic Proposal Clearance Form

Maxwell, Bruce D.

399

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY  

E-Print Network [OSTI]

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

Sheldon, Nathan D.

400

International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security  

E-Print Network [OSTI]

1 TUDelft International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security Dirk Jan van den Berg President Del2 University of Technology participants, Nuclear security requires highly skilled experts. Professionals, who are familiar

Langendoen, Koen

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumber ofES&HGlobal Security

402

Tag: global security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurityglobal security

403

Office of Secure Transportation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002 Wholesale PowerSecurity Office of Oil,ArgonneServices

404

:Linux . :Windows+DotNet( )  

E-Print Network [OSTI]

Action Rotate Action PIL Collaborative Picture Gallery Students: Aviad Barzilai & Amos Hersch Supervisor

Sidi, Moshe

405

Computer Sciences @ Wisconsin OS Qualifier: Fall 2011 Instructions: Answer all six questions.  

E-Print Network [OSTI]

to improve the security of a system, as in the VAX VMM security kernel. a) Both VMware and the VAX security kernel use ring compression to implement

Liblit, Ben

406

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

407

Visual analysis of code security  

SciTech Connect (OSTI)

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

Goodall, John R [ORNL] [ORNL; Radwan, Hassan [Applied Visions, Inc.] [Applied Visions, Inc.; Halseth, Lenny [Applied Visions, Inc.] [Applied Visions, Inc.

2010-01-01T23:59:59.000Z

408

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

409

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

410

Security-by-design handbook.  

SciTech Connect (OSTI)

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

411

Climate Change and National Security  

SciTech Connect (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

Malone, Elizabeth L.

2013-02-01T23:59:59.000Z

412

KERNEL BASED SYNTHETIC DISCRIMINANT FUNCTION FOR OBJECT RECOGNITION Kyu-Hwa Jeong, Puskal P. Pokharel, Jian-Wu Xu, Seungju Han, Jose C. Principe  

E-Print Network [OSTI]

function (SDF) is proposed. The SDF is a well known 2- D correlation filter for object recognition. The proposed non- linear version of the SDF is derived from kernel-based lear- ning. The kernel SDF the performance of the linear SDF by incorporating the image's class higher order moments. We show that this ker

Slatton, Clint

413

Integrated safeguards and security management plan  

SciTech Connect (OSTI)

Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

Bowen, Sue, editor

2001-04-16T23:59:59.000Z

414

Status of the National Security Workforce  

SciTech Connect (OSTI)

This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

None

2008-03-31T23:59:59.000Z

415

safeguards | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -| National Nuclear Security

416

Nuclear Safeguards and Security Challenge:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArms Control R&D ConsortiumNuclearSafeguards and Security Challenge:

417

Security Cases | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security

418

Security_Walls_VPP_Award  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March

419

Sandia National Laboratories: Climate Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy AdvancedEnergyEnergyMapping WaterMonitoringClimate Security

420

assa security center: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cures All Dumb Ideas in Computer Security 919 Jul 2011 12 147 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Office of Environmental Management (EM)

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

422

2014 Headquarters Facilities Master Security Plan - Chapter 11...  

Office of Environmental Management (EM)

1, Incidents of Security Concern 2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern October 2014 2014 Headquarters Facilities Master...

423

2014 Headquarters Facilities Master Security Plan - Chapter 17...  

Office of Environmental Management (EM)

7, Headquarters Security Officer Program 2014 Headquarters Facilities Master Security Plan - Chapter 17, Headquarters Security Officer Program June 2014 2014 Headquarters...

424

Energy and Security in Northeast Asia: Proposals for Nuclear Cooperation  

E-Print Network [OSTI]

The bilateral nuclear and security agreement between theThe bilateral nuclear and security agreement between thein East Asia's security, nuclear energy, and environment. It

Kaneko, Kumao; Suzuki, Atsuyuki; Choi, Jor-Shan; Fei, Edward

1998-01-01T23:59:59.000Z

425

all-weather security surveillance: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

426

Journal of Machine Learning Research 12 (2011) 1313-1347 Submitted 3/10; Revised 10/10; Published 4/11 A Family of Simple Non-Parametric Kernel Learning Algorithms  

E-Print Network [OSTI]

/11 A Family of Simple Non-Parametric Kernel Learning Algorithms Jinfeng Zhuang ZHUA0016@NTU.EDU.SG Ivor W. Tsang IVORTSANG@NTU.EDU.SG Steven C.H. Hoi CHHOI@NTU.EDU.SG School of Computer Engineering Nanyang results. Therefore, the choice of an effective kernel plays a crucial role in many kernel based machine

Tsang Wai Hung "Ivor"

427

Embedded Controllers Control. Connectivity. Security.  

E-Print Network [OSTI]

Application Summary MCF5282 HVAC and Security Control Panel Application Summary MCF5307 Music Media Player controllers to help get their products to market quickly and cost-effectively. Aggressive price of continuous innovative technology--provides customers with the opportunity to build market share

Grantner, Janos L.

428

International Aviation Security Technology Symposium  

E-Print Network [OSTI]

Laboratory, US Dept. of Homeland Security, William J. Hughes Technical Center; Atlantic City, NJ, USA-wave Mach number as a function of distance from the explosion center. These data then yield a peak. Characterization of an explosive requires understanding of the energy released during detonation. Typically TNT

Settles, Gary S.

429

Cloud Security by Max Garvey  

E-Print Network [OSTI]

Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service Network access Resource pooling Elasticity of Resources Measured Service #12;Cloud Types/Variants Iaa Cloud Public Cloud Hybrid Cloud combination. Private cloud with overflow going to public cloud. #12

Tolmach, Andrew

430

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

431

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network [OSTI]

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

432

Security & Sustainability College of Charleston  

E-Print Network [OSTI]

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

Young, Paul Thomas

433

Corporate Security and Conflict Outcomes  

E-Print Network [OSTI]

..................................................................................................... 75 Competition in Security Contracting and Conflict Outcomes .................................. 80 Research Design ....................................................................................................... 88 Dependent Variable... ................................... 16 Table 2 Contracted Service Total by Corporate Structure ............................................... 42 Table 3 The Effects of Public and Individual Firms Operating in Iraq (Part A) .............. 54 Table 4 The Effects of Public...

Tkach, Benjamin K

2013-10-21T23:59:59.000Z

434

KNOWLEDGE: Building, Securing, Sharing & Applying  

E-Print Network [OSTI]

is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

435

An Operations Research approach to aviation security  

E-Print Network [OSTI]

Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

Martonosi, Susan Elizabeth

2005-01-01T23:59:59.000Z

436

Statistical analysis of correlated fossil fuel securities  

E-Print Network [OSTI]

Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

Li, Derek Z

2011-01-01T23:59:59.000Z

437

Safeguards and Security Program, acronyms and abbereviations...  

Office of Environmental Management (EM)

Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 August 26, 2005 Canceled Safeguards and Security...

438

Site Tour Security Plan.pdf  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Site Tours Regarding Request for Proposal No. DE-SOL-0001458 Page 1 of 6 SECURITY PLAN The Pantex Plant (Pantex), Y-12 National Security Complex (Y-12), and the Tritium...

439

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses

440

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses (not

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Improving tamper detection for hazardous waste security  

SciTech Connect (OSTI)

After September 11, waste managers are increasingly expected to provide improved levels of security for the hazardous materials in their charge. Many low-level wastes that previously had minimal or no security must now be well protected, while high-level wastes require even greater levels of security than previously employed. This demand for improved security comes, in many cases, without waste managers being provided the necessary additional funding, personnel, or security expertise. Contributing to the problem is the fact that--at least in our experience--waste managers often fail to appreciate certain types of security vulnerabilities. They frequently overlook or underestimate the security risks associated with disgruntled or compromised insiders, or the potential legal and political liabilities associated with nonexistent or ineffective security. Also frequently overlooked are potential threats from waste management critics who could resort to sabotage, vandalism, or civil disobedience for purposes of discrediting a waste management program.

Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Martinez, R. K. (Ronald K.); Martinez, D. D. (Debbie D.); Lopez, L. N. (Leon N.)

2002-01-01T23:59:59.000Z

442

Building an Information Technology Security Awareness  

E-Print Network [OSTI]

Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

443

Security Equipment and Systems Certification Program (SESCP)  

SciTech Connect (OSTI)

Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

1996-06-20T23:59:59.000Z

444

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network [OSTI]

the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

445

Physical Security System Sensitivity to DBT Perturbations  

E-Print Network [OSTI]

, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities...

Conchewski, Curtis

2012-10-19T23:59:59.000Z

446

Delegating Network Security with More Information  

E-Print Network [OSTI]

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

Naous, Jad

447

New Solicitations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Stewardship Science Academic Alliances New Solicitations New Solicitations The National Nuclear Security Administration's Office of Research, Development, Test, and Evaluation...

448

Preproposal Conference & Site Tour | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Preproposal Conference & Site Tour | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

449

Spring 2013 Computer Security Midterm 1  

E-Print Network [OSTI]

the site's security officers have set a policy that all access between machines must use two separate forms

Paxson, Vern

450

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

J. [2004], Low-latency cryptographic protection for SCADAlatency high-integrity security retrofit for lecacy SCADA

Amin, Saurabh

2011-01-01T23:59:59.000Z

451

Track 6: Integrating Safety Into Security Operations  

Broader source: Energy.gov [DOE]

ISM Workshop Presentations Knoxville Convention Center, Knoxville, TN August 2009 Track 6: Integrating Safety Into Security Operations

452

Infrastructure & Sustainability | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

& Sustainability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

453

Energy Security: Microgrid Planning and Design (Presentation)  

SciTech Connect (OSTI)

Energy Security: Microgrid Planning and Design presentation to be given at the 2012 WREF in Denver, CO.

Giraldez, J.

2012-05-01T23:59:59.000Z

454

Security and United States Immigration Policy  

E-Print Network [OSTI]

National Security Council memorandum as created to encourage defection of all USSR nationals and key personnel from the satellite

Totten, Robbie James

2012-01-01T23:59:59.000Z

455

Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security  

E-Print Network [OSTI]

Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

Kim, Kwangjo

456

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using a Graphical  

E-Print Network [OSTI]

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using of California, Davis {hoagland,pandey,levitt}@cs.ucdavis.edu Technical Report CSE-98-3 A security policy states for organizations to declare their security policies, even informal state- ments would be better than the current

California at Davis, University of

457

National Security Issues at Department of Homeland Security and Department of Wednesday, November 18th  

E-Print Network [OSTI]

Transformational & Applied Research Directorate U.S. Department of Homeland Security Domestic Nuclear Detection Directorate at the Department of Homeland Security's Domestic Nuclear Detection Office. In this role, heSeminar: National Security Issues at Department of Homeland Security and Department of Energy

Farritor, Shane

458

Continental energy security: Energy security in the North American context1  

E-Print Network [OSTI]

, commissioned reports, and signed legislation in an effort to stem crude oil imports and improve energy securityERG/201101 Continental energy security: Energy security in the North American context1 Larry Hughes, Canada 24 January 2011 1 A textbox for the Global Energy Assessment's Knowledge Module 5: Energy Security

Hughes, Larry

459

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network [OSTI]

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

460

GEORG-AUGUST-UNIVERSITT Computer Security  

E-Print Network [OSTI]

systems 2 #12;GEORG-AUGUST-UNIVERSIT?T G?TTINGEN Why Security? » Computer systems are ubiquitous in our daily life » Computers store and process our data » Computers access and control our resources » More: intelligent security systems » Machine learning and arti cial intelligence for security 4 T-800 HAL 9000WOPR

Grabowski, Jens

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Systems Security at Chemical and Biochemical Engineering  

E-Print Network [OSTI]

and Biochemical Engineering. The Systems Administrator for Chemical and Biochemical Engineering regularly reviews network security.However, maintaining systems security is a group effort and a never-ending task. Here Administrator regarding security bugs that may affect your personal computer. If a patch is available, download

462

Human Resources Security Access Matrix Function Training  

E-Print Network [OSTI]

June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

Wu, Shin-Tson

463

Optimal Security Liquidation Algorithms Sergiy Butenko  

E-Print Network [OSTI]

using a set of historical sample-paths of prices. 1. Introduction Consider the following decision making positions for several securities. Historical sequences of prices of these securities (after opening. The algorithms provide path-dependent strategies which sell some fractions of security depending upon price

Uryasev, Stanislav

464

Oak Ridge National Laboratory National Security Programs  

E-Print Network [OSTI]

Oak Ridge National Laboratory National Security Programs Dr. Michael A. Kuliasha, Chief Scientist National Security Technologies Oak Ridge National Laboratory #12;2 OAK RIDGE NATIONAL LABORATORY U. S Security Challenges #12;3 OAK RIDGE NATIONAL LABORATORY U. S. DEPARTMENT OF ENERGY How Will Our Enemies

465

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

466

Cloud Security: Issues and Concerns Pierangela Samarati*  

E-Print Network [OSTI]

1 Cloud Security: Issues and Concerns Authors Pierangela Samarati* Università degli Studi di Milano, Italy sabrina.decapitani@unimi.it Keywords cloud security confidentiality integrity availability secure data storage and processing Summary The cloud has emerged as a successful computing paradigm

Samarati, Pierangela

467

Third Annual Cyber Security and Information  

E-Print Network [OSTI]

Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

Krings, Axel W.

468

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

469

Cyber Security in Smart Grid Substations  

E-Print Network [OSTI]

Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

Utrecht, Universiteit

470

Business-driven security White paper  

E-Print Network [OSTI]

March 2008 Business-driven security White paper Take a holistic approach to business-driven security. #12;Take a holistic approach to business-driven security. 2 Overview Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates

471

Energy Security in Nova Scotia Larry Hughes  

E-Print Network [OSTI]

to maintain energy security #12;Mr. Harper and his energy superpower · "...an ocean of oil soaked sand liesERG/200706 Energy Security in Nova Scotia Larry Hughes Energy Research Group Electrical to Café Canada, Mahone Bay 30 November 2007 #12;Energy security in Nova Scotia Larry Hughes, PhD Energy

Hughes, Larry

472

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

473

Noise Kernel and Stress Energy Bi-Tensor of Quantum Fields in Conformally-Optical Metrics: Schwarzschild Black Holes  

E-Print Network [OSTI]

In Paper II [N. G. Phillips and B. L. Hu, previous abstract] we presented the details for the regularization of the noise kernel of a quantum scalar field in optical spacetimes by the modified point separation scheme, and a Gaussian approximation for the Green function. We worked out the regularized noise kernel for two examples: hot flat space and optical Schwarzschild metric. In this paper we consider noise kernels for a scalar field in the Schwarzschild black hole. Much of the work in the point separation approach is to determine how the divergent piece conformally transforms. For the Schwarzschild metric we find that the fluctuations of the stress tensor of the Hawking flux in the far field region checks with the analytic results given by Campos and Hu earlier [A. Campos and B. L. Hu, Phys. Rev. D {\\bf 58} (1998) 125021; Int. J. Theor. Phys. {\\bf 38} (1999) 1253]. We also verify Page's result [D. N. Page, Phys. Rev. {\\bf D25}, 1499 (1982)] for the stress tensor, which, though used often, still lacks a rigorous proof, as in his original work the direct use of the conformal transformation was circumvented. However, as in the optical case, we show that the Gaussian approximation applied to the Green function produces significant error in the noise kernel on the Schwarzschild horizon. As before we identify the failure as occurring at the fourth covariant derivative order.

Nicholas G Phillips; B. L. Hu

2002-09-17T23:59:59.000Z

474

Growth of Hereford-Kedah Kelantan calves fed oil palm fronds and palm kernel cake based diet  

E-Print Network [OSTI]

Growth of Hereford-Kedah Kelantan calves fed oil palm fronds and palm kernel cake based diet I Lumpur, Malaysia Being one of the world's leading producers of palm oil, Malaysia has a total of two million hectares of land under oil palm cultivation. The palm oil mills yield a number of by

Paris-Sud XI, Université de

475

RTK-Spec TRON: A Simulation Model of an ITRON Based RTOS Kernel in SystemC  

E-Print Network [OSTI]

This paper presents the methodology and the modeling constructs we have developed to capture the real time aspects of RTOS simulation models in a System Level Design Language (SLDL) like SystemC. We describe these constructs and show how they are used to build a simulation model of an RTOS kernel targeting the $\\mu$-ITRON OS specification standard.

Hassan, M Abdelsalam; Takeuchi, Yoshinori; Imai, Masaharu

2011-01-01T23:59:59.000Z

476

TechOnLine Welcome, Tech Groups  

E-Print Network [OSTI]

Technical Papers Forums Tech Topics: Bluetooth CSoC Design Services Internet/Network Security Java Linux

LaMeres, Brock J.

477

TechOnLine Welcom Tech Groups  

E-Print Network [OSTI]

Topics: Bluetooth CSoC Design Services Internet/Network Security Java Linux MEMS Power Supplies RTOS

LaMeres, Brock J.

478

Facility Security Checklist U.S. Department of Transportation  

E-Print Network [OSTI]

was the last time security logs and/or incident reports were reviewed? 25. Is there a current security plan

Goodman, Robert M.

479

NISTIR 6462 CSPP -Guidance for COTS Security Protection Profiles  

E-Print Network [OSTI]

..................................................................................................................................................4 2.2 OPERATIONAL ENVIRONMENT ............................................................................................................................... 25 4.3 JOINT TOE/ENVIRONMENT SECURITY OBJECTIVES...................................................................................................................5 3. SECURITY ENVIRONMENT

480

2012 Annual Planning Summary for National Nuclear Security Administrat...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration 2012 Annual Planning Summary for National Nuclear Security Administration The ongoing and projected Environmental Assessments and...

Note: This page contains sample records for the topic "linux kernel security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Kernel polynomial method for a nonorthogonal electronic-structure calculation of amorphous diamond  

SciTech Connect (OSTI)

The Kernel polynomial method (KPM) has been successfully applied to tight-binding electronic-structure calculations as an O(N) method. Here we extend this method to nonorthogonal basis sets with a sparse overlap matrix {bold S} and a sparse Hamiltonian {bold H}. Since the KPM method utilizes matrix vector multiplications it is necessary to apply {bold S}{sup {minus}1}{bold H} onto a vector. The multiplication of {bold S}{sup {minus}1} is performed using a preconditioned conjugate-gradient method and does not involve the explicit inversion of {bold S}. Hence the method scales the same way as the original KPM method, i.e., O(N), although there is an overhead due to the additional conjugate-gradient part. We apply this method to a large scale electronic-structure calculation of amorphous diamond. {copyright} {ital 1997} {ital The American Physical Society}

Roeder, H.; Silver, R.N. [Theoretical Division, Los Alamos National Laboratory, Los Alamos, New Mexico 87545 (United States); Drabold, D.A.; Dong, J.J. [Department of Physics and Astronomy, Condensed Matter and Surface Science Program, Ohio University, Athens, Ohio 45701 (United States)

1997-06-01T23:59:59.000Z

482

Estimating the Bias of Local Polynomial Approximation Methods Using the Peano Kernel  

SciTech Connect (OSTI)

The determination of uncertainty of an estimate requires both the variance and the bias of the estimate. Calculating the variance of local polynomial approximation (LPA) estimates is straightforward. We present a method, using the Peano Kernel Theorem, to estimate the bias of LPA estimates and show how this can be used to optimize the LPA parameters in terms of the bias-variance tradeoff. Figures of merit are derived and values calculated for several common methods. The results in the literature are expanded by giving bias error bounds that are valid for all lengths of the smoothing interval, generalizing the currently available asymptotic results that are only valid in the limit as the length of this interval goes to zero.

Blair, J.; Machorro, E.; Luttman, A.

2013-03-01T23:59:59.000Z

483

Power and Torque Characteristics of Diesel Engine Fuelled by Palm-Kernel Oil Biodiesel  

E-Print Network [OSTI]

Short-term engine performance tests were carried out on test diesel engine fuelled with Palm kernel oil (PKO) biodiesel. The biodiesel fuel was produced through transesterification process using 100g PKO, 20.0 % ethanol (wt%), 1.0 % potassium hydroxide catalyst at 60C reaction temperature and 90min. reaction time. The diesel engine was attached to a general electric dynamometer. Torque and power delivered by the engine were monitored throughout the 24-hour test duration at 1300, 1500, 1700, 2000, 2250 and 2500rpm. At all engine speeds tested, results showed that torque and power outputs for PKO biodiesel were generally lower than those for petroleum diesel. Also, Peak torque for PKO biodiesel occurred at a lower engine speed compared to diesel.

Oguntola J Alamu; Ezra A Adeleke; Nurudeen O. Adekunle; Salam O; Oguntola J Alamu; Ezra A Adeleke; Nurudeen O Adekunle; Salam O Ismaila

484

Reliable Process for Security Policy Deployment  

E-Print Network [OSTI]

We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies.

Preda, Stere; Cuppens, Frederic; Garcia-Alfaro, Joaquin; Toutain, Laurent

2009-01-01T23:59:59.000Z

485

ECE 468/668L (Embedded Computing) Lab #4: The Boot Process  

E-Print Network [OSTI]

ECE 468/668L (Embedded Computing) Lab #4: The Boot Process In this lab you are to study the boot for the linux kernel, modifying the boot loader to include the new kernel, and adding a custom function. Those concepts include the kernel, boot loaders, virtual machines, and kernel functions. If there is any

Hoover, Adam

486

Production of Depleted UO2Kernels for the Advanced Gas-Cooled Reactor Program for Use in TRISO Coating Development  

SciTech Connect (OSTI)

The main objective of the Depleted UO{sub 2} Kernels Production Task at Oak Ridge National Laboratory (ORNL) was to conduct two small-scale production campaigns to produce 2 kg of UO{sub 2} kernels with diameters of 500 {+-} 20 {micro}m and 3.5 kg of UO{sub 2} kernels with diameters of 350 {+-} 10 {micro}m for the U.S. Department of Energy Advanced Fuel Cycle Initiative Program. The final acceptance requirements for the UO{sub 2} kernels are provided in the first section of this report. The kernels were prepared for use by the ORNL Metals and Ceramics Division in a development study to perfect the triisotropic (TRISO) coating process. It was important that the kernels be strong and near theoretical density, with excellent sphericity, minimal surface roughness, and no cracking. This report gives a detailed description of the production efforts and results as well as an in-depth description of the internal gelation process and its chemistry. It describes the laboratory-scale gel-forming apparatus, optimum broth formulation and operating conditions, preparation of the acid-deficient uranyl nitrate stock solution, the system used to provide uniform broth droplet formation and control, and the process of calcining and sintering UO{sub 3} {center_dot} 2H{sub 2}O microspheres to form dense UO{sub 2} kernels. The report also describes improvements and best past practices for uranium kernel formation via the internal gelation process, which utilizes hexamethylenetetramine and urea. Improvements were made in broth formulation and broth droplet formation and control that made it possible in many of the runs in the campaign to produce the desired 350 {+-} 10-{micro}m-diameter kernels, and to obtain very high yields.

Collins, J.L.

2004-12-02T23:59:59.000Z

487

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect (OSTI)

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

488

Simulated Interdiction: Proliferation Security Initiative  

E-Print Network [OSTI]

Parthia to curtail its nuclear weapons development programs. However, Bearia has often disagreed sharply with the U.S. and other international partners on specific steps to persuade Parthia to halt uranium enrichment. 17 For Simulation Use Only...For Simulation Use Only i For Simulation Use Only i George Bush School of Government and Public Service Nuclear Engineering Department Nuclear Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated...

2009-01-01T23:59:59.000Z

489

research | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective

490

Nonproliferation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNationalNewportBig Eddy

491

Security Council Approval of Kofi  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC.509

492

Safety and Security Policy Jobs  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial CarbonArticlesHuman Resources

493

About SRNL - Directorates - National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)Productssondeadjustsondeadjust DocumentationARMStreamsUSBudgetEnterpriseFermilabNational Security

494

Microgrid cyber security reference architecture.  

SciTech Connect (OSTI)

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

495

Extender for securing a closure  

DOE Patents [OSTI]

An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

Thomas, II, Patrick A.

2012-10-02T23:59:59.000Z

496

Well Logging Security Initiatives | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched FerromagnetismWaste and Materials Disposition3February 2015ProgramMyWelcomeWelding

497

Y-12 National Security Complex | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched FerromagnetismWaste and MaterialsWenjun1ofRadiative HeatingInnovation

498

Senator Blunt visits National Security Campus | National Nuclear Security  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclearhas 'Natitude'Security AdministrationNuclearFY13Under

499

Dedication of NNSA's National Security Campus | National Nuclear Security  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartmentStewardshipAdministration| NationalNuclear SecurityDash for

500

Security and Training | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassiveSubmitted forHighlights Nuclear PhysicsDoDepartmentSecurity and Training