National Library of Energy BETA

Sample records for local privacy act

  1. Family Educational Rights and Privacy Act (FERPA)

    E-Print Network [OSTI]

    Bordenstein, Seth

    Practices · Tools and Resources FERPA Overview #12;Family Educational Rights and Privacy Act of 1974 · FERPAFamily Educational Rights and Privacy Act (FERPA) An Overview Bart Quinet University Registrar Vanderbilt University #12;· Background · Key Concepts · Annual Notification · Education Records · Public vs

  2. WIPP - Privacy Act of 1974

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopmentat LENA|UpcomingVisit UsNews ThisPrivacy Act Quick Links

  3. Freedom of Information Act (FOIA) and Privacy Act Requests |...

    Broader source: Energy.gov (indexed) [DOE]

    ID. You must either have your request notarized or 1) acknowledge that you understand the criminal penalty in the Privacy Act for requesting or obtaining access to records under...

  4. The Genetic Privacy Act and commentary

    SciTech Connect (OSTI)

    Annas, G.J.; Glantz, L.H.; Roche, P.A.

    1995-02-28

    The Genetic Privacy Act is a proposal for federal legislation. The Act is based on the premise that genetic information is different from other types of personal information in ways that require special protection. Therefore, to effectively protect genetic privacy unauthorized collection and analysis of individually identifiable DNA must be prohibited. As a result, the premise of the Act is that no stranger should have or control identifiable DNA samples or genetic information about an individual unless that individual specifically authorizes the collection of DNA samples for the purpose of genetic analysis, authorized the creation of that private information, and has access to and control over the dissemination of that information.

  5. The Genetic Privacy Act and commentary

    SciTech Connect (OSTI)

    Annas, G.J.; Glantz, L.H.; Roche, P.A.

    1995-02-28

    The Genetic Privacy Act is a proposal for federal legislation. The Act is based on the premise that genetic information is different from other types of personal information in ways that require special protection. The DNA molecule holds an extensive amount of currently indecipherable information. The major goal of the Human Genome Project is to decipher this code so that the information it contains is accessible. The privacy question is, accessible to whom? The highly personal nature of the information contained in DNA can be illustrated by thinking of DNA as containing an individual`s {open_quotes}future diary.{close_quotes} A diary is perhaps the most personal and private document a person can create. It contains a person`s innermost thoughts and perceptions, and is usually hidden and locked to assure its secrecy. Diaries describe the past. The information in one`s genetic code can be thought of as a coded probabilistic future diary because it describes an important part of a unique and personal future. This document presents an introduction to the proposal for federal legislation `the Genetic Privacy Act`; a copy of the proposed act; and comment.

  6. Making a Privacy Act Request - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion toMSDS on theMaitrayeeEnergyMaking a Privacy Act

  7. Notification of Rights Under (Family Educational Rights and Privacy Act)

    E-Print Network [OSTI]

    Selmic, Sandra

    Notification of Rights Under FERPA (Family Educational Rights and Privacy Act) for Post Secondary Institutions Page 102 #12;The Family Educational Rights and Privacy Act (FERPA) affords students certain rights); a person or company with whom the University has contracted (such as an attorney, auditor, or collection

  8. LM Records Handling System-Freedom of Information/Privacy Act...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Freedom of InformationPrivacy Act, Office of Legacy management LM Records Handling System-Freedom of InformationPrivacy Act, Office of Legacy management LM Records Handling...

  9. U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST

    Energy Savers [EERE]

    identifying data that would help locate the record (e.g., maiden name, occupational license number, time and place of employment, etc.): To verify my identity for Privacy Act...

  10. Family Educational Rights and Privacy Act (FERPA) The Family Educational Rights and Privacy Act (FERPA) requires UNCW to release detailed information to

    E-Print Network [OSTI]

    Olszewski Jr., Edward A.

    Family Educational Rights and Privacy Act (FERPA) The Family Educational Rights and Privacy Act (FERPA) requires UNCW to release detailed information to the student only. Students may, however, voluntarily waive their privacy rights to the person(s) identified in the statement below. By completing

  11. Privacy Act | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . .Privacy Act

  12. ACADEMIC INFORMATION / COLLEGE POLICIES FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA)

    E-Print Network [OSTI]

    Sun, Yi

    ACADEMIC INFORMATION / COLLEGE POLICIES FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA) Pursuant, as Amended, you have the right to withhold the disclosure of the "Directory Information" listed below. Please to the Family Educational Rights and Privacy Act (FERPA) and the Board of Trustees of The City University of New

  13. AUTHORIZATION TO RELEASE FINANCIAL INFORMATION The Family Educational Rights and Privacy Act (FERPA) of 1974 is designed to protect the privacy of a student's

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    AUTHORIZATION TO RELEASE FINANCIAL INFORMATION The Family Educational Rights and Privacy Act (FERPA include financial aid, scholarship and billing/account information, and will not be released without to release confidential information to designated person(s). Student Name

  14. Privacy Act Officers Contact List | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . . . .Privacy

  15. U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 Timeline ofTurkey Near-Zero ZoneInsulation » PRIVACY

  16. Freedom of Information and Privacy Act - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvanServicesAmesFour LosAct Freedom of Information and

  17. Privacy Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . . . . . .

  18. Family Privacy Protection Act Policy (Enacted Pursuant to S.C. Code Section 30-2-10 et. seq.)*

    E-Print Network [OSTI]

    Stuart, Steven J.

    foundations and entities and to provide goods and services to its students, parents, alumni and employees Educational and Right to Privacy Act (20 USC 1232g), as appropriate. 4. Campus Directory Information. The university has determined that publication of its annual campus telephone directory is a business necessity

  19. AIM Access Request Access to confidential student information is protected under the Family Educational Rights and Privacy Act (FERPA), and

    E-Print Network [OSTI]

    Hart, Gus

    of the options below and provide the required information to the right. Replace an existing employee who hasAIM Access Request Access to confidential student information is protected under the Family Educational Rights and Privacy Act (FERPA), and access should only be requested when there is a need to access

  20. Privacy Management Plan 1 Privacy Management Plan

    E-Print Network [OSTI]

    University of Technology, Sydney

    Privacy Management Plan 1 Privacy Management Plan Abstract The Privacy Management Plan outlines how Impact Assessment Tool (.docm) (staff only) Records Management Vice-Chancellor's Directive Handling Management Plan 2 Legislation Privacy and Personal Information Protection Act 1998 (NSW) (PPIPIA) Health

  1. NOTIFICATION OF STUDENT RIGHTS UNDER FERPA The Family Educational Rights and Privacy Act (FERPA) affords students certain rights with respect to their

    E-Print Network [OSTI]

    NOTIFICATION OF STUDENT RIGHTS UNDER FERPA The Family Educational Rights and Privacy Act (FERPA or company with whom the University has contracted as its agent to provide a service instead of using

  2. Student records at The University of Utah are governed by the Family Educational Rights and Privacy Act (FERPA) and its implementing regulations. Under the Act, Directory Information relating to the student is considered to be public information unless th

    E-Print Network [OSTI]

    Tipple, Brett

    Student records at The University of Utah are governed by the Family Educational Rights and Privacy Act (FERPA) and its implementing regulations. Under the Act, Directory Information relating to the student is considered to be public information unless the student formally requests in writing

  3. The Costs of Privacy in Local Energy Markets Erik Buchmann, Stephan Kessler, Patrick Jochem and Klemens Bohm

    E-Print Network [OSTI]

    Buchmann, Erik

    ] include the obligation to make the production and distribution of energy transparent. This includesThe Costs of Privacy in Local Energy Markets Erik Buchmann, Stephan Kessler, Patrick Jochem and Klemens B¨ohm Karlsruhe Institute of Technology (KIT) 76131 Karlsruhe, Germany Abstract-- Many renewable

  4. Lubricants under high local pressure: Liquids act like solids

    E-Print Network [OSTI]

    Mueser, Martin

    Lubricants under high local pressure: Liquids act like solids Schmierstoffe unter hohem lokalem Druck: Flu¨ ssigkeiten verhalten sich wie Fest- stoffe M. H. Mu¨ ser A lubricant layer solidifies when confining surfaces slide past each other induces flow in the lubricant layer that is akin of plastic flow

  5. Think Global, Act Local; Projectome Estimation with BlueMatter

    E-Print Network [OSTI]

    Wandell, Brian A.

    [1]. Understanding the architecture of these long-range projections (the projectome) is importantThink Global, Act Local; Projectome Estimation with BlueMatter Anthony J. Sherbondy1 , Robert F, USA Abstract. Estimating the complete set of white matter fascicles (the projectome) from diffusion

  6. Department of Energy Privacy Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    The order establishes Departmental implementation of agency statutory and regulatory requirements for privacy, specifically those provided in the Privacy Act of 1974, as amended at Title 5 United States Code (U.S.C.) 552a, Section 208 of the E Government Act of 2002, and Office of Management and Budget directives. Cancels DOE N 206.5.

  7. Correcting Privacy Act Records

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAuditsClusterInformationContractCorporate Culture | National

  8. Recovery Act: Local Energy Assurance Planning Initiatives | Department...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    will help ensure local governments can recover and restore power quickly following any energy supply disruptions. PRESS RELEASES February 19, 2010 Secretary Chu Announces Over...

  9. Recovery Act Local Energy Assurance Planning (LEAP) Initiative Funding

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget ||DepartmentReadoutReviewRecordRecovery Act

  10. It is the policy of Saint Michael's College, in accordance with the Family Educational Rights and Privacy Act (FERPA), to withhold disclosure of personally identifiable information from educational records except when the

    E-Print Network [OSTI]

    Weaver, Adam Lee

    It is the policy of Saint Michael's College, in accordance with the Family Educational Rights and Privacy Act (FERPA), to withhold disclosure of personally identifiable information from educational. There is information about FERPA on the college Website (at the Registrar's Office pages) and in the college catalogue

  11. "Green Technology: Think Globally, Act Locally" Remarks at the Green Innovation Forum in Tokyo, Japan

    E-Print Network [OSTI]

    Ginzel, Matthew

    and leads the world in installed wind power. I power. The term "think globally and act locally" has many authors, including, advocated striking a balance between staying connected with both civilization

  12. AB 2188: Implementation of the California Solar Rights Act at the Local Level

    Broader source: Energy.gov [DOE]

    This document is intended to provide guidance for implementing the Solar Permitting Efficiency Act (AB 2188), which was enacted in California in 2015, in substantial conformance with the California Solar Permitting Guidebook. This document also includes a stand-alone model ordinance that complies with the requirements of the Solar Rights Act, as amended. The sections of this document are organized to first provide the reader with the statutory requirements of AB 2188 and the existing requirements of the Solar Rights Act, followed by the recommendations from the California Solar Permitting Guidebook for substantial conformance with regard to the permitting requirements for local permitting processes.

  13. Correction of Privacy Act Records

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit the followingConcentratingPortalCoolCoronary Stents Improved

  14. Request for Privacy Act Records

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100 Winners *ReindustrializationEnergyWind

  15. The Privacy Act of 1974

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsState of Pennsylvania U.S.The6,

  16. Privacy Act Systems of Records

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . .

  17. Privacy: The Small and Large of It

    SciTech Connect (OSTI)

    NUSBAUM,ANNA W.

    1999-10-22

    The topic of Privacy is complex, multi-faceted, and often emotionally laden. This paper will cover the following topics, in an effort to further understanding of federal regulations and activities, the balancing act that necessarily occurs in business, and what role a records manager can play. The topics are: Definitions; The Privacy Act; ''Private'' companies; Potential areas of concern; Expectations; Corporate responsibilities; Case studies; and Records Manager's role.

  18. Information Privacy Statement Commitment to Privacy

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    ' privacy and actively seeks to preserve the privacy rights of those who share information with us. Your trust is important to us and we believe you have the right to know how information submitted1 Information Privacy Statement Commitment to Privacy The University of Florida values individuals

  19. Privacy Aware Learning John C. Duchi1

    E-Print Network [OSTI]

    Jordan, Michael I.

    of privacy the data preserves and the utility, measured by convergence rate, of any statistical estimator. 1 of Electrical Engineering and Computer Science, 2 Department of Statistics University of California, Berkeley. In this local privacy framework, we establish sharp upper and lower bounds on the convergence rates

  20. EMERGENCY INFORMATION State Privacy Notification

    E-Print Network [OSTI]

    Hernes, Peter J.

    April 2005 EMERGENCY INFORMATION State Privacy Notification The State of California Information Practices Act of 1977 (effective July 1, 1978) requires the University to provide the following information to individuals who are asked to supply information about themselves. The principal purpose for requesting

  1. PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF

    E-Print Network [OSTI]

    Mullins, Dyche

    PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF The Family Educational Rights and Privacy Act (FERPA) and UC policy restrict the disclosure of information from student records. Presume that all student information is confidential, and do not disclose information without a student

  2. PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF

    E-Print Network [OSTI]

    Martin, Gail

    PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF The Family Educational Rights and Privacy Act (FERPA) and UC policy restrict the disclosure of information from student records, allow students to opt out, create a private blog, or consider using the Collaborative Learning

  3. Personal Health Information Act (PHIA) and Research

    E-Print Network [OSTI]

    Brownstone, Rob

    Personal Health Information Act (PHIA) and Research Dalhousie Research Ethics Board Presented Information Act ­ Provincial privacy legislation under the Nova Scotia Department of Health and Wellness health information for planning or research. · Follows the pattern of protection adopted by various

  4. CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records...

    Energy Savers [EERE]

    CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records Maria Levesque, Director Records & Privacy Management...

  5. Local environmental decision-making with the California environmental quality act: a Santa Barbara case study 

    E-Print Network [OSTI]

    Karstadt, Kent Leonard

    1985-01-01

    . DATABASE FINDINGS General. Tlllle Cost Participation. Project Resolution and Revisions. CONCLUSIONS CEQA and Local Land Use Policy. T1lll1ng. Costs. Public Participation and Scoping. . . . . . Mitigation Measures and Alter natives. . Other... Conclusions and Observations. . . . RECOMMENDATIONS CEQA and Local Land Use Policy. Timing and Costs. . . . . . . . . . . . . . . . . . . . . . Public Participation and Scoping. . . . . . . Mitigation Measures and Alternatives. . . . 13 . . 15 . 17 22...

  6. Shifts in Privacy Concerns

    E-Print Network [OSTI]

    Tucker, Catherine Elizabeth

    This paper explores how digitization and the associated use of customer data have affected the evolution of consumer privacy concerns. We measure privacy concerns by reluctance to disclose income in an online marketing ...

  7. Website Privacy Notice Applicability

    E-Print Network [OSTI]

    in this privacy notice. Other units at the university may collect and use visitor information in different ways. Therefore, visitors to other university websites should review the privacy notices for the particular sites such changes will be consistent with our commitment to respecting visitor privacy, and will be clearly posted

  8. Records, OIA, Privacy and Copyright obligations

    E-Print Network [OSTI]

    Hickman, Mark

    hacked to make news · Records of business/emails are discoverable under the OIA or Privacy Act · Once. · Requirement to create and maintain records ­ full and accurate, in accordance with normal, prudent business are records of business transactions #12;OIA Requests · Come frequently throughout the university · 20 working

  9. Thinking globally - acting locally an energy company`s response to land stewardship

    SciTech Connect (OSTI)

    McIntyre, D. [Sasaki Associates, Inc., Watertown, MA (United States)

    1995-12-01

    This paper explores the application of contemporary land use planning principles in the Kingdom of Saudi Aramco, the world`s largest oil company, relative to Company-controlled land located in the Eastern Province of the Kingdom. The Eastern Province is the world`s most productive hydrocarbon resource. The Province has witnessed extraordinary industrialization over 25 years due to the exploitation of the oil resource. Saudi Aramco commissioned the planning study to set a course of action which fully considers the consequences such development may have on the social, economic and environmental characteristics of the metropolitan area. In addition to existing developed areas, the study area encompasses a unique desert environment including salts flats, native vegetation, habitat for migrating wildlife and extraordinary geologic formations overlying an important water resource. A Master Plan established a framework of land use, open space, transportation and infrastructure to guide the development of the region over the next 25 years. The Plan emphasizes the redevelopment of industrialized areas for other uses leveraging capital investment to improve quality of the built environment and establishes institutional mechanisms necessary to fully achieve implementation. The study is innovative because (1) a global energy company assumes a leadership role in stewarding its land resource, (2) incorporates contemporary land use planning techniques within a context where such planning is absent, (3) emphasizes redevelopment of industrialized areas, where historically development has simply been directed to the next available undeveloped site, and (4) applies the principles of sustainable land use planning by responding to cultural influences, strengthening local economies and preserving important natural assets. The study establishes a precendent for {open_quotes}corporate environmentalism{close_quotes}and offers a model approach to land use planning in the developing world.

  10. Privacy Impact Assessment

    Office of Environmental Management (EM)

    No hand-written submissions will be accepted. This template may not be modified. MODULE I - PRIVACY NEEDS ASSESSMENT Date Date the assessment was completed. Departmental...

  11. Privacy notice of SLS Applicability

    E-Print Network [OSTI]

    Indiana University

    will be used only as outlined in this privacy notice. Other units at the university may collect and use visitor information in different ways. Therefore, visitors to other university web sites should review the privacy with our commitment to respecting visitor privacy, and will be clearly posted in a revised privacy notice

  12. Big Data Privacy Scenarios

    E-Print Network [OSTI]

    Bruce, Elizabeth

    2015-10-01

    This paper is the first in a series on privacy in Big Data. As an outgrowth of a series of workshops on the topic, the Big Data Privacy Working Group undertook a study of a series of use scenarios to highlight the challenges ...

  13. BPA-2011-00311-Privacy Act Request

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O DBiomassBudgetAugust 19, 2009E+^ , FO,cF^ ` ^g1ES OFCEIVED

  14. Access to Records Under The Privacy Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News Publications Traditional Knowledge KiosksAbout UsAbout NewAcceleratorAccepting,Clean

  15. General Privacy Act Guidance | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11, SolarMat 4" |a,- p^A CU ^for Generalinformation

  16. Privacy Act Disclosures | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosures | National

  17. Privacy Act Exemptions | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosures |

  18. Privacy Act Requests | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosures |Fees

  19. Privacy Act Statement | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosures |FeesStatement

  20. Privacy Act Violations | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosuresViolations |

  1. More on FOIA/Privacy Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework uses concrete7ModificationsMonitoringAdministration About

  2. Points of Contact and Privacy Act Advisory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/OPerformancePi Day Pi Day Pi DayPlasmaandAbout UsPoints

  3. September 24, 2012 Annual Notification of Student Privacy Rights under FERPA and Notice of Public Information

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    September 24, 2012 Annual Notification of Student Privacy Rights under FERPA and Notice of Public Information Dear Sammy Slug: The Office of the Registrar would like to take this opportunity to give you a brief summary of your rights under the Family Educational Rights and Privacy Act (FERPA), the federal

  4. PROTECTION OF PRIVACY POLICY

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 PROTECTION OF PRIVACY POLICY University Policy No: GV0235 Classification: Governance Procedures for the Management of Personal Information University Information Security Classification other mechanism that produces records. 8.00 Surveillance Systems means an analog or digital video

  5. Guides for Freedom of Information Act and Privacy Act 1974

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunitiesNERSCGrid-based

  6. Privacy-preserving data mining 

    E-Print Network [OSTI]

    Zhang, Nan

    2009-05-15

    In the research of privacy-preserving data mining, we address issues related to extracting knowledge from large amounts of data without violating the privacy of the data owners. In this study, we first introduce an integrated baseline architecture...

  7. Privacy regulation and online advertising

    E-Print Network [OSTI]

    Goldfarb, Avi

    Advertisers use online customer data to target their marketing appeals. This has heightened consumers' privacy concerns, leading governments to pass laws designed to protect consumer privacy by restricting the use of data ...

  8. NOAA Privacy Impact Assessment Guidance Revised 5/8/2014

    E-Print Network [OSTI]

    Assessment (PIA), IT system, records PURPOSE AND SCOPE A PIA is a process for determining the risks to ensure the privacy of personal information in electronic records (specific citation for Section 208 is 44. The Trade Secrets Act (18 USC 1905) provides criminal penalties for the theft of trade secrets and other

  9. Privacy Act of 1974; Publication of Compilation of Privacy Act Systems of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report Appendices | Department ofPrioritization Tool

  10. PRIVACY, CITIES AND FINANCE

    E-Print Network [OSTI]

    Columbia University

    , Government and Academia April 1, 2015 LOW MEMORIAL LIBRARY, ROTUNDA COLUMBIA UNIVERSITY #12;#Data Science Institute, we have the honor of welcoming you today to our 2015 Symposium, Privacy, Cities and Finance in the Digital Age. The Data Science Institute is led by the Engineering School and involves

  11. Mlp1 acts as a scaffold to localize Mad1 in between reforming telophase nuclei in Aspergillus nidulans

    E-Print Network [OSTI]

    De Souza, Colin P.; Hashmi, Shahr B.; Nayak, Tania; Oakley, Berl R.; Osmani, Stephen A.

    2009-04-15

    During open mitosis several nuclear pore complex (NPC) proteins have mitotic specific localizations and functions. We find that the Aspergillus nidulans Mlp1 NPC protein has previously unrealized mitotic roles involving spatial regulation of spindle...

  12. Trusted Cloud: Microsoft Azure Security, Privacy,

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance April 2015 #12;Trusted Cloud................................................................. 18 #12;Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance | April, 2015 Introduction: Microsoft Azure Security, Privacy, and Compliance | April, 2015 #12;3 Contents Introduction

  13. Data Protection The Data Protection Act 1984 has now been replaced by the Data Protection Act 1998,

    E-Print Network [OSTI]

    Data Protection The Data Protection Act 1984 has now been replaced by the Data Protection Act 1998, which is based on the European Data Protection Directive. The 1998 Act applies to both manual for privacy and access by individuals. Information on how to make a request for access to personal data under

  14. Lightweight and Privacy-Preserving Delegatable Proofs of Storage

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Lightweight and Privacy-Preserving Delegatable Proofs of Storage Jia Xu1 , Anjia Yang1,2 , Jianying of storage (POR or PDP) is a cryptographic tool, which enables data owner or third party auditor to audit integrity of data stored remotely in a cloud storage server, without keeping a local copy of data

  15. Computational Differential Privacy Ilya Mironov1

    E-Print Network [OSTI]

    Vadhan, Salil

    require privacy guarantees to hold only against efficient--i.e., computationally- bounded--adversaries. We

  16. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  17. Noiseless Database Privacy Raghav Bhaskar

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Noiseless Database Privacy Raghav Bhaskar Microsoft Research India rbhaskar@microsoft.com Abhishek as a gold standard in the field of database privacy. While this notion has the benefit of providing concrete explore is to exploit the entropy already present in the database and substitute that in the place

  18. The Privacy Coach: Supporting customer privacy in the Internet of Things

    E-Print Network [OSTI]

    Broenink, Gerben; Hof, Christian van 't; van Kranenburg, Rob; Smits, David; Wisman, Tijmen

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the two, and informing the user of the outcome. In this paper we report on the architecture of the Privacy Coach, and show how it enables users to make informed privacy decisions in a user-friendly manner. We also spend considerable time to discuss lessons learnt and to describe future plans to further improve on the Privacy Coach concept.

  19. Noise Injection for Search Privacy Protection

    E-Print Network [OSTI]

    Ye, Shaozhi; Wu, S F; Pandey, Raju; Chen, Hao

    2009-01-01

    W. Gray, “On introducing noise into the bus-contention chan-R. Pandey, and H. Chen, “Noise injection for search privacyNoise Injection for Search Privacy Protection Shaozhi Ye,

  20. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Pedersen, Tom

    Privacy and Security Protecting Personal Information Kim Hart and Bill Trott #12;Privacy Video http and security and apply the principles to your work situation; · Overview of Freedom of Information records with confidential and highly confidential information; · Faculty and staff may have privacy/security

  1. Davison Health Center Notice of Privacy Practices

    E-Print Network [OSTI]

    Royer, Dana

    Davison Health Center Notice of Privacy Practices This notice describes how your medical. Davison Health Center must maintain the privacy of your personal health information and give you this notice that describes our legal duties and privacy practices concerning your personal health information

  2. East Tennessee State University Web Privacy Statement

    E-Print Network [OSTI]

    Karsai, Istvan

    East Tennessee State University Web Privacy Statement A Note to Children and Parents East Tennessee through a university Web site is handled. ETSU understands the importance of protecting the privacy of personal information, especially in today's electronic environment. This privacy policy covers the Web

  3. TITLE: HIPAA PRIVACY AND INFORMATION SECURITY TRAINING FOR COLUMBIA UNIVERSITY MEDICAL CENTER WORKFORCE

    E-Print Network [OSTI]

    Columbia University

    . The online training includes two modules. o HIPAA Privacy o Security Essentials Workforce members shall "Compliance") and select training module TC0019 (HIPAA: Health Insurance Portability and Accountability Act) is provided through the online training modules. It is the responsibility of each school to assure that all

  4. Privacy Notice | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPress ReleasesPrincipalPrivacy &Privacy

  5. State and local compliance with Title I of the Clean Air Act. Hearing before the Subcommittee on Clean Air and Nuclear Regulation of the Committee on Environment and Public Works, United States Senate, One Hundred Third Congress, First Session, August 3, 1993

    SciTech Connect (OSTI)

    NONE

    1993-12-31

    The hearing addresses State and local compliance with Title I of The Clean Air Act. Implementation of the Act at local levels are examined, along with difficulties in meeting the clean air attainment goals. Statements of government, academic and industry officials are included along with documents submitted for the record.

  6. Privacy in Quantum Communication Complexity

    E-Print Network [OSTI]

    Iordanis Kerenidis; Mathieu Laurière; François Le Gall; Mathys Rennela

    2014-09-30

    In two-party quantum communication complexity, Alice and Bob receive some classical inputs and wish to compute some function that depends on both these inputs, while minimizing the communication. This model has found numerous applications in many areas of computer science. One question that has received a lot of attention recently is whether it is possible to perform such protocols in a private way. We show that defining privacy for quantum protocols is not so straightforward and it depends on whether we assume that the registers where Alice and Bob receive their classical inputs are in fact classical registers (and hence unentangled with the rest of the protocol) or quantum registers (and hence can be entangled with the rest of the protocol or the environment). We provide new quantum protocols for the Inner Product function and for Private Information Retrieval, and show that the privacy assuming classical input registers can be exponentially smaller than the privacy assuming quantum input registers. We also argue that the right notion of privacy of a communication protocol is the one assuming classical input registers, since otherwise the players can deviate considerably from the protocol.

  7. Personal Privacy in Ubiquitous Computing Tools and System Support

    E-Print Network [OSTI]

    Personal Privacy in Ubiquitous Computing Tools and System Support Marc Langheinrich #12;Personal Privacy in Ubiquitous Computing 2 Ubiquitous Computing und Privacy Disappearing Computer Troubadour find their own ways of cheating" Inkompatibel mit Ubiquitous Computing Forschung ,,I think you can

  8. Citizen's Attitudes About Privacy: Results Citizen's Attitudes about Privacy While Accessing Government Websites

    E-Print Network [OSTI]

    Yang, Junfeng

    Citizen's Attitudes About Privacy: Results 1 Citizen's Attitudes about Privacy While Accessing 10027 March 3, 2003 Abstract This paper reports the results of an investigation on citizens' attitudes Private Portal that protects citizen's personally identifying information when accessing government

  9. U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST

    National Nuclear Security Administration (NNSA)

    Medical Personnel Records X-Ray Reports Radiation Exposure Report Occupational and Industrial Records Other If "other" is checked, please describe the type of records you are...

  10. FERPA Tutorial (Family Educational Rights and Privacy Act of 1974)

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    's Office ­ (413) 545-0555 Page 1 #12;Undergraduate Registrar's Office ­ (413) 545-0555 Page 2 Prospective to any other person. #12;Undergraduate Registrar's Office ­ (413) 545-0555 Page 3 Post-attendance Records

  11. Freedom of Information and Privacy Act Database PIA, Idaho Operations...

    Broader source: Energy.gov (indexed) [DOE]

    Office More Documents & Publications PIA - Security Clearance Work Tracking and Budget System TRAIN-PIA.pdf Occupational Medicine - Assistant PIA, Idaho National Laboratory...

  12. BPA-2011-00311-Privacy Act FOIA Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O DBiomassBudgetAugust 19, 2009E+^ , FO,cF^ ` ^g1ES OF

  13. 10 CFR 1008, Records Maintained On Individuals (Privacy Act) | Department

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And StatisticsProgram Manager Directoryof EnergyUsedVivian O'DellThis is a(Energy-1 1 PDF

  14. U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en4 SPONSORED BY8DECEMBER4 SPONSORED

  15. Privacy Act Fees and Time Limits | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosures |Fees and Time

  16. Privacy Act Links to Relates Sites | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosures |Fees and

  17. Privacy Act System Notices | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosures

  18. Freedom of Information and Privacy Act - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journal Article)Forthcoming Upgrades to theGameFranklin5Freedom of

  19. Privacy Act (PA) of 1974 | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . . . . .

  20. Privacy Act Statement | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . . .

  1. Freedom of Information and Privacy Act Database PIA, Idaho Operations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof Energy Services » ProgramPolicySenateFlyer, Title VIFormatBlogFredOffice

  2. 10 CFR 1008, Records Maintained On Individuals (Privacy Act) | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergy Webinar: Demonstration ofDepartment of Energyof Energy 10

  3. Department of Energy Data Access and Privacy Issues Related To...

    Energy Savers [EERE]

    Department of Energy Data Access and Privacy Issues Related To Smart Grid Technologies Department of Energy Data Access and Privacy Issues Related To Smart Grid Technologies This...

  4. Public Roundtable- Data Access and Privacy Issues Related to...

    Energy Savers [EERE]

    Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

  5. Subjects of Privacy: Law, Sexuality and Violence in India

    E-Print Network [OSTI]

    Singh, Pawan

    2014-01-01

    of California, San Diego Subjects of Privacy: Law, Sexualityan entirely private subject. The underlying suggestion hereMoreover, once the subject of privacy is constituted through

  6. Consumers' Cognitive, Affective, and Behavioral Responses to an Invasion of Privacy: Essays on Understanding Consumer's Privacy Concerns 

    E-Print Network [OSTI]

    Srivastava, Mona

    2009-05-15

    This dissertation focuses on the discrepancy between consumers’ attitudes towards privacy and actual behavior. Although consumers increasingly protest against invasions of privacy, they routinely disclose more information ...

  7. Privacy Challenges for Wireless Medical Devices

    SciTech Connect (OSTI)

    Lagesse, Brent J [ORNL] [ORNL

    2010-01-01

    Implantable medical devices are becoming more pervasive as new technologies increase their reliability and safety. Furthermore, these devices are becoming increasingly reliant on wireless communication for interaction with the device. Such technologies have the potential to leak information that could be utilized by an attacker to threaten the lives of patients. Privacy of patient information is essential; however, this information is not the only privacy issue that must be considered. In this paper, we discuss why information privacy is insufficient for protecting patients from some attacks and how information regarding the presence of individual devices can leak vulnerabilities. Furthermore, we examine existing privacy enhancing algorithms and discuss their applicability to implantable medical devices.

  8. Privacy Impact Assessment

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy AEnergyPresidential PermitDAYSDepartment of EnergyAct (PAA)

  9. Information Privacy Policy & Procedure Manual Health Information Privacy Forms: 1 Copyright 2003 -2013. University of Florida. All rights reserved. Version: 09/01/2013

    E-Print Network [OSTI]

    Sin, Peter

    of person whose Information Privacy rights may have been violated (if different from above): Relationship or organization) do you believe violated information privacy rights or committed another privacy violation believe your (or someone else's) information privacy rights were violated

  10. Health and Privacy: The Experience of a Regulator 

    E-Print Network [OSTI]

    Anderson, Ken

    Paper presented by Anderson for the Privacy Workshop, chaired by Edwards and held in September 2005.

  11. Email Clients as Decentralized Social Apps in Mr. Privacy

    E-Print Network [OSTI]

    Lam, Monica

    Email Clients as Decentralized Social Apps in Mr. Privacy Michael H. Fischer T. J. Purtell Monica S,tpurtell,lam}@cs.stanford.edu Abstract. This paper proposes Mr. Privacy, a social application frame- work built on top of email, that encourages open competition and pro- vides privacy for users. Applications built on Mr. Privacy are "social

  12. Privacy Impact Assessment Development and Membership Information

    E-Print Network [OSTI]

    Mathis, Wayne N.

    1 Privacy Impact Assessment Development and Membership Information I. System Identification 1. IT System Name: Development and Membership Information System (DMIS) 2. Mission Sponsor: Virginia Clark and membership. II. Privacy Assessment 1. What information is being (or will be) collected. The Development

  13. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Victoria, University of

    key privacy and security concepts specific to academic units; · Integrate the knowledge through/security questions; · External Review recommended wider education and training at the university #12;Why Are You Here principles · Proactive · Better practices #12;University's commitment Protection of Privacy Policy

  14. American Disabilities Act

    Broader source: Energy.gov [DOE]

    The Americans with Disabilities Act prohibits private employers, state and local governments, employment agencies and labor unions from discriminating against qualified individuals with disabilities in job application procedures, hiring, firing, advancement, compensation, job training, and other terms, conditions, and privileges of employment.

  15. Privacy engineering for social networks

    E-Print Network [OSTI]

    Anderson, Jonathan

    2013-01-08

    of communication. 1.2 CONTRIBUTIONS The scenarios in the previous section provide windows into a complex socio- technical system. In this dissertation, I do not attempt to “solve” social prob- lems by pressing them into the mold of graph theory or other easily... change their users’ implicit privacy contract, pushing users into ever-less- private social interaction (§3.1.1). Services have a history of leaking users’ private information both to advertisers (§3.1.2) and to application developers (§3.1.3). OSN...

  16. Privacy Notice | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPress ReleasesPrincipalPrivacy

  17. Recovery Act

    Broader source: Energy.gov [DOE]

    Recovery Act and Energy Department programs were designed to stimulate the economy while creating new power sources, conserving resources and aligning the nation to once again lead the global energy economy.

  18. Privacy-preserving Queries over Relational Databases

    E-Print Network [OSTI]

    Goldberg, Ian

    techniques, such as onion routers and mix networks, offer anonymizing protection for users' identities the query through Tor [12] to preserve the privacy of his or her network address. Nevertheless, the server

  19. PRIVACY IMPACT ASSESSMENT: OCIO HSPD-12 Physical

    Broader source: Energy.gov (indexed) [DOE]

    no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site August 27,2009 Office of...

  20. MAINTAINING PRIVACY IN RFID ENABLED ENVIRONMENTS

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    , whereabouts and habits concerns arise about the maintenance of privacy. People are afraid of being `scanned and applications beyond logistics. In fact, manufacturers, retailers and consumers can all take advantage

  1. Towards Privacy Preserving of Forensic DNA Databases 

    E-Print Network [OSTI]

    Liu, Sanmin

    2012-02-14

    Protecting privacy of individuals is critical for forensic genetics. In a kinship/identity testing, related DNA profiles between user's query and the DNA database need to be extracted. However, unrelated profiles cannot be revealed to each other...

  2. Routing Through the Mist: Privacy Preserving Communication

    E-Print Network [OSTI]

    Kapadia, Apu

    Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments National Laboratories. Abstract Ubiquitous computing is poised to revolutionize the way we compute with services and other entities that wander within the ubiquitous computing environment. Keywords Ubiquitous

  3. Americans with Disabilities Act Signed (1990)

    Broader source: Energy.gov [DOE]

    The Americans with Disabilities Act of 1990 (ADA) prohibits discrimination and ensures equal opportunity for persons with disabilities in employment, State and local government services, public...

  4. BPA Records: your rights under the freedom of information act and the Privacy act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAudits & Inspections Audits Generation Hydro Power Wind PowerPower4 [BPA

  5. Freedom of Information Act (FOIA) and Privacy Act Requests | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report toDepartment ofEnergy4DecathlonMarcinowskiEnergy

  6. ContextProbe : exploring mobile privacy in context

    E-Print Network [OSTI]

    Shih, Fuming

    2015-01-01

    My research investigates the following question: What factors affect people's privacy preferences for disclosing data that is collected about them when interacting with mobile applications? Research about information privacy ...

  7. DOE Convenes Multi-stakeholder Process to Address Privacy for...

    Energy Savers [EERE]

    DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by Smart Grid Technologies DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by...

  8. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access, and University policy and procedures regarding use, privacy and confidentiality of information. University data University (University) functions that are: a) stored on University information systems, b) maintained

  9. The World Summit on the Information Society - Privacy not found 

    E-Print Network [OSTI]

    Jørgensen, Rikke Frank; Bendrath, Ralf

    Paper presented by Joergensen and Bendarth for the Privacy Workshop, chaired by Edwards held in September 2005.

  10. Achieving Differential Privacy of Data Disclosure in the Smart Grid

    E-Print Network [OSTI]

    Li, Xiang-Yang

    Achieving Differential Privacy of Data Disclosure in the Smart Grid Jing Zhao Taeho Jung Yu Wang-- The smart grid introduces new privacy implications to individuals and their family due to the fine of the proposed method over existing BLH methods. Index Terms--Smart Grid, Smart Meter, Privacy, Differential

  11. Secure Multiparty Computation for Privacy-Preserving Data Mining

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Secure Multiparty Computation for Privacy-Preserving Data Mining Yehuda Lindell Benny Pinkas May 6 and discuss their relevance to the field of privacy-preserving data mining. In addition to re- viewing to privacy-preserving data mining. Finally, we discuss the relationship between secure multiparty computation

  12. Center for Cyber-Security, Information Privacy, and Trust

    E-Print Network [OSTI]

    Lee, Dongwon

    Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

  13. Information Privacy Policy & Procedure Manual Health Information Privacy Forms: 1 Copyright 2003 -2013. University of Florida. All rights reserved. Version: 09/01/2013

    E-Print Network [OSTI]

    Sin, Peter

    Information Privacy Policy & Procedure Manual Health Information Privacy Forms: 1 ©Copyright 2003 - 2013. University of Florida. All rights reserved. Version: 09/01/2013 ACUSE de Recibo MRN

  14. PrivacyInformer : an automated privacy description generator for the MIT App Inventor

    E-Print Network [OSTI]

    Miao, Daniela Yidan

    2014-01-01

    With the advent of "smart" mobile phones and ubiquitous mobile applications, the pace at which people generate, access, and acquire data has accelerated significantly. In this thesis, we first examine how privacy issues ...

  15. Privacy Preserving Business Process Matching Dilian Gurov

    E-Print Network [OSTI]

    Gurov, Dilian

    Privacy Preserving Business Process Matching Dilian Gurov KTH Royal Institute of Technology E-mail: dilian@kth.se Peeter Laud Cybernetica E-mail: peeter.laud@cyber.ee Roberto Guanciale KTH Royal Institute these properties. The value of business processes is steadily increasing, and enterprises may even use the patent

  16. 2014 Gaurav Lahoti PRIVACY-PRESERVING

    E-Print Network [OSTI]

    this concern. This ap- proach calculates tax by monitoring vehicle road usage through GPS and odometer data© 2014 Gaurav Lahoti #12;PRIVACY-PRESERVING VEHICLE MILES TRAVELED (PPVMT) TAX BY GAURAV LAHOTI, Illinois Adviser: Professor Carl A. Gunter #12;Abstract Motor fuel taxes form a great part of the total

  17. POLICIES & PROCEDURES Privacy of Personal Information

    E-Print Network [OSTI]

    Cohen, Randy W.

    POLICIES & PROCEDURES Privacy of Personal Information Policy 500-8025 Revision Date: 11 of information in its custody. This includes the physical security of the equipment where information is processed and maintained, and the preservation of information in case of intentional, accidental, or natural

  18. Information Access and Privacy Protection Office

    E-Print Network [OSTI]

    deYoung, Brad

    Information Access and Privacy Protection Office I A P P Guidelines for Using Personal Information in Email and Faxes Memorial University employees are required to protect personal information (defined personal information ­ your own or someone else's. Email and faxes, in particular, pose challenges

  19. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  20. Health Insurance Privacy Policy 2.15

    E-Print Network [OSTI]

    Howat, Ian M.

    Health Insurance Privacy Policy 2.15 Office of Human Resources Applies to: Faculty, staff protected health information about members in its health benefit plans. Federal Health Insurance Portability by the health benefit programs and grant members certain rights with respect to their information. To protect

  1. Adnostic: Privacy Preserving Targeted Advertising Vincent Toubiana

    E-Print Network [OSTI]

    Nissenbaum, Helen

    across web sites in order to infer user interests and preferences. These interests and preferences that OBA and privacy are inherently in conflict. In this paper we propose a practical architectureSense service will begin targeting ads based on the user's browsing behavior [4]. In the next section we survey

  2. Security and Privacy Protection in Wireless

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    31 Security and Privacy Protection in Wireless Sensor Networks 31.1 Introduction 31.2 Unique applications of wireless sensor networks (WSNs). The list of potential applications that require protection Mechanisms WSNs share several important properties with traditional wireless networks, most notably

  3. Radiation Protection Act (Pennsylvania)

    Broader source: Energy.gov [DOE]

    This Act combines the radiation safety provisions of The Atomic Energy Development and Radiation Control Act and the Environmental Radiation Protection Act, and empowers the Department of...

  4. NBP RFI: Data Access, Third Party Use and Privacy- Comments of...

    Energy Savers [EERE]

    Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities Telecom Council hereby...

  5. Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing

    E-Print Network [OSTI]

    2009-01-01

    implications for ubiquitous computing. CoDesign, 2(1), 3-15.Design for privacy in ubiquitous computing environments. Inconsent: privacy in ubiquitous computing (Ubicomp). In

  6. NBP RFI: Data Access, Third Party Use, and Privacy- Comments...

    Energy Savers [EERE]

    & Publications Comments of Oncor Electric Delivery Company LLC Department of Energy Data Access and Privacy Issues Related To Smart Grid Technologies NBP RFI: Data Access,...

  7. Data Privacy by Design: Digital Infrastructures for Clinical Collaborations

    E-Print Network [OSTI]

    Sinnott, R.O.

    Sinnott,R.O. Ajayi,O. Stell,A.J. International Conference on Security and Privacy, Orlando, USA, July 2009.

  8. Achieving Participatory Privacy Regulation: Guidelines for CENS Urban Sensing

    E-Print Network [OSTI]

    Shilton, Katie; Burke, Jeffrey A; Estrin, D; Hansen, Mark; Srivastava, Mani B.

    2008-01-01

    Socio-Technical Ubiquitous Computing Systems (GeorgiaImplications for Ubiquitous Computing." CoDesign 2.1 (2006):for Privacy in Ubiquitous Computing Environments." Third

  9. The Davis-Bacon Act: Vestige of Jim Crow

    E-Print Network [OSTI]

    Bernstein, David

    1994-01-01

    ironic, given that Davis-Bacon has par- ticularly harshoppo- sition of local activist to Davis-Bacon Act).a tenuous one." '4 7 The Davis-Bacon Act was soon to further

  10. PRIVACY IMPACT ASSESSMENT: Visitor Dosimeter Badge Tracking

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuilding energy codes have a PRIVACY IMPACT ASSESSMENT: Visitor

  11. Medical information and the right to privacy

    SciTech Connect (OSTI)

    Drell, D.

    1994-06-01

    This report is a compilation of submitted abstracts of papers presented at the DOE-supported workshop on medical information and the right to privacy held at the National Academy of Sciences in Washington, DC, on June 9 and 10, 1994. The aim of this meeting is to provide a forum to discuss the legal, ethical and practical issues related to the computerization and use of medical data, as well as the potential impact the use of these data may have on an individual`s privacy. Topical areas include an overview of the Federal and legal requirements to collect medical data, historical experiences with worker screening programs, currently available medical surveillance technologies (both biomedical and computer technologies) and their limitations. In addition, an-depth assessment of the needs and interests of a wide spectrum of parties as they relate to the use of medical data from both a legal and privacy perspective is provided. The needs of the individual, the public (e.g., blood and tissue banks), private enterprises (e.g., industry and insurance carriers), and the government (e.g., FBI) are discussed. Finally, the practical and legal issues relating to the use of computers to carry, store and transmit this information are also examined. The abstracts are presented in the intended order of presentation as indicated in the agenda for the meeting.

  12. National Construction Safety Team Act Annual Report

    E-Print Network [OSTI]

    Magee, Joseph W.

    National Construction Safety Team Act Annual Report Fiscal Year 2008 Summary This annual report to Congress for FY 2008 is required by the National Construction Safety Team Act. NIST completed its federal report. The ICC Codes are widely adopted and used as the basis for state and local construction codes

  13. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing

    E-Print Network [OSTI]

    Madiraju, Praveen

    Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing Scott Lederer disclosed through a ubiquitous computing system. We found that privacy preferences varied by inquirer more privacy in ubiquitous computing. Keywords Ubiquitous Computing, Privacy, Social and Legal Issues

  14. Privacy Management at UC Information and Records Management

    E-Print Network [OSTI]

    Hickman, Mark

    or criminal records. See a full list of the types of information collected about individuals at UC in SectionPrivacy. Privacy Management at UC Information and Records Management (IRM) www Records Management 3 1. Introduction Information that staff or contractors create and collect at UC needs

  15. Optimal Privacy-Preserving Energy Management for Smart Meters

    E-Print Network [OSTI]

    Zhang, Junshan

    Optimal Privacy-Preserving Energy Management for Smart Meters Lei Yang, Xu Chen, Junshan Zhang, Smart Grid, Data Privacy, Load Monitor, Cost Saving, Battery I. INTRODUCTION A. Motivation Smart meters, and H. Vincent Poor School of Electrical, Computer and Energy Engineering, Arizona State University

  16. Anti-discrimination Analysis Using Privacy Attack Strategies

    E-Print Network [OSTI]

    Ruggieri, Salvatore

    Anti-discrimination Analysis Using Privacy Attack Strategies Salvatore Ruggieri1 , Sara Hajian2 and Technology, Saudi Arabia Abstract. Social discrimination discovery from data is an important task to identify deploy privacy at- tack strategies as tools for discrimination discovery under hard assump- tions which

  17. Cryptography Challenges for Computational Privacy in Public Clouds

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Cryptography Challenges for Computational Privacy in Public Clouds Sashank Dara Cisco Systems security but its readiness for this new generational shift of computing platform i.e. Cloud Computing into the underpinnings of Computational Privacy and lead to better solutions. I. INTRODUCTION Cloud computing came out

  18. Privacy-Preserving Public Auditing for Secure Cloud Storage

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Privacy-Preserving Public Auditing for Secure Cloud Storage Cong Wang, Student Member, IEEE burden to user. In this paper, we propose a secure cloud storage system supporting privacy for data integrity. Examples of outages and security breaches of noteworthy cloud services appear from time

  19. Middleware for Pervasive Spaces: Balancing Privacy and Utility

    E-Print Network [OSTI]

    Venkatasubramanian, Nalini

    Middleware for Pervasive Spaces: Balancing Privacy and Utility Daniel Massaguer, Bijit Hore the utility of the information ex- posed and ensure that this information does not violate users' privacy. In order to resolve these conflicts, we propose a framework grounded in utility theory where users

  20. Privacy Preserving Smart Metering System Based Retail Level Electricity Market

    E-Print Network [OSTI]

    Franchetti, Franz

    1 Privacy Preserving Smart Metering System Based Retail Level Electricity Market Cory Thoma, Tao technologies which includes load management and retail level electricity market support. Index Terms as the various market functionalities also pose great risks to customer privacy. In this work we propose a secure

  1. Enhancing Location Privacy for Electric Vehicles (at the right time)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhancing Location Privacy for Electric Vehicles (at the right time) Joseph K. Liu1 , Man Ho Au2 University of Wollongong, Australia {aau, wsusilo}@uow.edu.au Abstract. An electric vehicle is a promising of electric vehicles at the right time, by proposing an anonymous payment system with privacy protection

  2. When do Data Mining Results Violate Privacy? Murat Kantarcioglu

    E-Print Network [OSTI]

    Jin, Jiashun

    When do Data Mining Results Violate Privacy? Murat Kantarcioglu Purdue University Computer Sciences Privacy-preserving data mining has concentrated on obtain- ing valid results when the input data. Categories and Subject Descriptors H.2.8 [Database Management]: Database Applications-- Data mining; H.2

  3. Literature Survey on Privacy Preserving Mechanisms for Data Publishing

    E-Print Network [OSTI]

    , to be leveraged as fuel for innovation [24]. Studies have shown that Open Data, in general, has big economic valueLiterature Survey on Privacy Preserving Mechanisms for Data Publishing November 1, 2013 Andrei Manta #12;#12;Literature Survey on Privacy Preserving Mechanisms for Data Publishing Literature Survey

  4. Analyzing Facebook Privacy Settings: User Expectations vs. Reality

    E-Print Network [OSTI]

    Gummadi, Krishna P.

    Analyzing Facebook Privacy Settings: User Expectations vs. Reality Yabing Liu Northeastern of personal data has emerged as a popular ac- tivity over online social networking sites like Facebook- tween the desired and actual privacy settings, quantifying the magnitude of the problem of managing

  5. Beyond Access Control: Managing Online Privacy via Exposure

    E-Print Network [OSTI]

    Gummadi, Krishna P.

    information from who actually does, because it ignores the difficulty of finding information. Third, access privacy. We list a few here; this list is by no means exhaustive: 1. When Facebook introduced the News to requiring the user to visit the friends' pages-- users objected strongly and accused Facebook of privacy

  6. Privacy Design Strategies (extended abstract) Jaap-Henk Hoepman1

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    implementation, but low when starting the project. Nu- merous privacy enhancing technologies (PETs) exists classification of privacy design patterns and the underlying pri- vacy enhancing technologies. We therefore development process. In other words starting when the initial concepts and ideas for a new system are drafted

  7. CANE: A Controlled Application Environment for Privacy Protection in ITS

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    --Many of the applications proposed for intelligent transportation systems (ITS) need to process and communicate detailed transportation systems (ITS), information and communication technologies are added to traffic systems in order, the application of privacy-by-design requires novel privacy-enhancing tech- nologies (PETs) that help to fulfill

  8. Privacy Design Strategies (extended abstract) # JaapHenk Hoepman 1

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    implementation, but low when starting the project. Nu­ merous privacy enhancing technologies (PETs) exists classification of privacy design patterns and the underlying pri­ vacy enhancing technologies. We therefore development process. In other words starting when the initial concepts and ideas for a new system are drafted

  9. The Unsolvable Privacy Problem and its Implications for Security Technologies

    E-Print Network [OSTI]

    Minnesota, University of

    Discrimination Price discrimination is the charging of varying prices when there are no cost jus- tifications argues that there are strong incentives for decreasing privacy, rooted in the economic benefits of price discrimination. As a result, the privacy problem is unsolvable. The conflict between incentives to price

  10. U.Commerce 6.0 | Bill+Payment 6.0.0 1997 -2012 TouchNet Information Systems, Inc. All rights reserved. | TouchNet Privacy Policy

    E-Print Network [OSTI]

    Hamburger, Peter

    U.Commerce 6.0 | Bill+Payment 6.0.0 ©1997 - 2012 TouchNet Information Systems, Inc. All rights, employers, etc.) the ability to access your account information. In compliance with the Family Educational Rights and Privacy Act of 1974 (FERPA), your student financial records may not be shared with a third

  11. Notification of Your Rights under the Family Educational Rights and Privacy Act The Family Educational Rights and Privacy Act (FERPA) affords students certain rights with

    E-Print Network [OSTI]

    Haller, Gary L.

    an institutional service or function for which the University would otherwise use its own employees and who responsibilities for the University. (b) As a public service, the University may disclose without consent directory). Additional details regarding directory information are available in the Directory Information Statement. (c

  12. Notification of Your Rights under the Family Educational Rights and Privacy Act The Family Educational Rights and Privacy Act (FERPA) affords students certain rights with

    E-Print Network [OSTI]

    Lee, Daeyeol

    , except to the extent that FERPA authorizes disclosure without consent. Title 34 Section 99.31 of the Code a student's prior written consent under the FERPA exception for disclosure to school officials with legitimate educational interests. A school official is a person employed by the University

  13. Privacy & Security Notice | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPress ReleasesPrincipalPrivacy &

  14. Sandia National Laboratories: Privacy and Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygenLaboratoryInnovationEmployeeNewsPublications AnnualPrivacy and

  15. Privacy Policy | Princeton Plasma Physics Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . .Privacy

  16. DOE Privacy Program Brochure | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergy Webinar:IAbout Us »Buildings DOEDOE FCalculationDOE09Privacy

  17. Privacy, Security, & Legal Disclaimer Notice - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPressthis site » Privacy PrivacyPrivacy,

  18. UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar Revised: 10/03/13 UCSC Policy of the student. #12;UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar UCSC

  19. How (Not) to Protect Genomic Data Privacy in a Distributed Network: Using Trail Re-identification to Evaluate and Design Privacy Protection Systems

    E-Print Network [OSTI]

    1 How (Not) to Protect Genomic Data Privacy in a Distributed Network: Using Trail Re-specific genomic data into clinical practice and research raises serious privacy concerns. Various systems have being disclosed, they lack formal proofs. In this paper, we study the erosion of privacy when genomic

  20. Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy Officers Divisional Information Security-Privacy Liaison Departmental Information Security-Privacy Liaison Planning Plan and conduct annual risk assessment Develop a prioritized

  1. A Theory of Utility and Privacy of Data Sources Lalitha Sankar, S. Raj Rajagopalan , H. Vincent Poor

    E-Print Network [OSTI]

    Sankar, Lalitha

    A Theory of Utility and Privacy of Data Sources Lalitha Sankar, S. Raj Rajagopalan , H. Vincent) while still providing measurable benefit (utility) to multiple legitimate information consumers. Rate sources, developing application independent utility and privacy metrics, quantifying utility- privacy

  2. Ajami : spaces between the street and the privacy of home

    E-Print Network [OSTI]

    Havilio, Noa, 1975-

    2003-01-01

    The thesis investigates, by research and design, spaces which are located between the street and the privacy of home, focusing on the case-study of Ajami; a mixed Palestinian-Israeli and Jewish-Israeli neighborhood in ...

  3. Privacy-preserving Queries over Relational Databases Femi Olumofin

    E-Print Network [OSTI]

    Goldberg, Ian

    . While today's most developed and deployed privacy tech- niques, such as onion routers and mix networks' queries. For the front running example, the user could tunnel the query through Tor [17] to preserve

  4. Privacy Preserving Business Process Fusion Roberto Guanciale(B)

    E-Print Network [OSTI]

    Gurov, Dilian

    Privacy Preserving Business Process Fusion Roberto Guanciale(B) and Dilian Gurov KTH Royal of business processes is widely recognized, and many enterprises have started to use the patent mechanism

  5. Transparent Accountable Data Mining: New Strategies for Privacy Protection

    E-Print Network [OSTI]

    Weitzner, Daniel J.

    2006-01-27

    Attempts to address issues of personal privacy in a world of computerized databases and information networks -- from security technology to data protection regulation to Fourth Amendment law jurisprudence -- typically ...

  6. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    SciTech Connect (OSTI)

    Rothstein, M.A.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  7. Efficiency and Privacy Tradeoffs in Mechanism Design University of Toronto

    E-Print Network [OSTI]

    Sandholm, Tuomas W.

    Efficiency and Privacy Tradeoffs in Mechanism Design Xin Sui University of Toronto Department that reach socially efficient decisions with minimal information revelation. This can reduce agent communica explored the tradeoff between communi- cation cost and efficiency, and more recently, communication

  8. 2015 Privacy Awareness Course (PAC) Annual Training | Department...

    Broader source: Energy.gov (indexed) [DOE]

    28, 2015 6:00AM to 9:00PM MDT Course Title: 2015 Privacy Awareness Course (PAC) Annual Training (COURSE 2015PACAICCv2) Completion Date: September 28, 2015 Audience: Mandatory...

  9. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access technology security incident. A standard Universitywide approach to information security is important the Information Technology Services Office has completed its investigation and authorizes such activity. 3

  10. Electronic Vehicle Identification: Industry Standards, Performance, and Privacy Issues

    E-Print Network [OSTI]

    Texas at Austin, University of

    0-5217-P2 Electronic Vehicle Identification: Industry Standards, Performance, and Privacy Issues Administration and the Texas Department of Transportation. Abstract: In this research product, industry standards functions. Keywords: Tolling, electronic vehicle identification, DSRC, standards, performance, electronic

  11. Intergovernmental Personnel Act Assignments

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-08-24

    This Manual implements provisions of the Intergovernmental Personnel Act (IPA) within the Department of Energy (DOE) and establishes requirements, responsibilities, and authority for effecting assignments under the Act. Does not cancel other directives.

  12. Recovery Act Milestones

    ScienceCinema (OSTI)

    Rogers, Matt

    2013-05-29

    Every 100 days, the Department of Energy is held accountable for a progress report on the American Recovery and Reinvestment Act. Update at 200 days, hosted by Matt Rogers, Senior Advisor to Secretary Steven Chu for Recovery Act Implementation.

  13. ACT-ARA

    Energy Science and Technology Software Center (OSTI)

    003092IBMPC00 ACT-ARA: Code System for the Calculation of Changes in Radiological Source Terms with Time   

  14. Privacy Preservation Technologies in Internet of Things

    E-Print Network [OSTI]

    Sen, Jaydip

    2010-01-01

    Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire lifecycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.

  15. Uniting Legislation with RFID Privacy-Enhancing Technologies Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum

    E-Print Network [OSTI]

    Tanenbaum, Andrew S.

    response by modulating the request signal using one or more subcarrier frequencies. These RFID tags can do. Keywords: Radio frequency identification, security, privacy, data protection legislation, privacy- enhancing technologies. 1 Introduction Radio Frequency Identification (RFID) technology faces security

  16. Data Privacy and the Smart Grid: A Voluntary Code of Conduct...

    Energy Savers [EERE]

    Data Privacy and the Smart Grid: A Voluntary Code of Conduct - Notice of Public Comment: Federal Register Notice, Volume 79, No. 177, September 12, 2014 Data Privacy and the Smart...

  17. Topic 7 : Smart Grid Privacy and Security 1Networking and Distributed Systems

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    Topic 7 : Smart Grid Privacy and Security 1Networking and Distributed Systems Department Tech UniversityCommunications and Control in Smart Grid 2 · Smart Meter Privacy · Concerns · Possible Solutions · Smart Grid Security · Load Altering Attacks · False Data Injection Attacks · Impact

  18. A Regulator's Privacy Guide to Third-Party Data Access for Energy...

    Broader source: Energy.gov (indexed) [DOE]

    Third Party Use, and Privacy FR Doc. 2010-11127 July 12, 2010 Department of Energy Data Access and Privacy Issues Related To Smart Grid Technologies Comments by the...

  19. A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society

    E-Print Network [OSTI]

    A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and SocietyHealth technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies

  20. Configurable Dynamic Privacy for Pervasive Sensor Networks Nan-Wei Gong

    E-Print Network [OSTI]

    1 Configurable Dynamic Privacy for Pervasive Sensor Networks by Nan-Wei Gong Submitted Privacy for Pervasive Sensor Networks by Nan-Wei Gong Submitted to the Program in Media Arts and Sciences

  1. AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing Safwan Mahmud Khan their computation results are ultimately delivered. To provide this data ownership privacy, the cloud's distributed-anonymity; authentication; cloud computing; in- formation security; privacy; Tor I. INTRODUCTION Revolutionary advances

  2. Security and Privacy Issues of Fog Computing: Shanhe Yi, Zhengrui Qin, and Qun Li

    E-Print Network [OSTI]

    Li, Qun

    in a brief manner. Keywords: Fog computing, cloud/mobile computing, security, privacy 1 Introduction-trivial extension of cloud, some security and privacy issues in the context of cloud computing [35], can be foreseenT), and originated from cloud computing, security and privacy issues of cloud are inherited in fog computing. While

  3. A li i f W l iA li i f W l iApplication of Wavelets inApplication of Wavelets in PrivacyPrivacy--preserving Data Miningpreserving Data MiningPrivacyPrivacy preserving Data Miningpreserving Data Mining

    E-Print Network [OSTI]

    Zhang, Jun

    Privacy--preserving Data Miningpreserving Data MiningPrivacyPrivacy preserving Data Miningpreserving Data Mining Jun Zhang in Data Mining AnalysisChallenges in Data Mining Analysis I d i i li i d iIn data mining applications, etc #12;Collaborative Data Mining AnalysisCollaborative Data Mining AnalysisCollaborative Data Mining

  4. Examining the Use of Surveys in Measuring Privacy in Ubiquitous Computing

    E-Print Network [OSTI]

    Connelly, Kay

    Examining the Use of Surveys in Measuring Privacy in Ubiquitous Computing Ashraf Khalil Computer@cs.indiana.edu INTRODUCTION With the increasing popularity of ubiquitous computing and context-aware services, the privacy of ubiquitous computing [1-4]. Most research on privacy in general and on ubiquitous computing in particular

  5. Privacy and Security Notice | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    or contract, and is used only as a source of anonymous statistical information. Rehabilitation Act The U.S. Department of Energy is committed to making its electronic and...

  6. Juror Privacy in the Sixth Amendment Balance

    E-Print Network [OSTI]

    Wilson, Melanie D.

    2012-01-01

    Some eight million citizens report for jury duty every year. Arguably, jury duty is one of the most significant opportunities to participate in the democratic process. For the accused, the jury acts as an indispensable ...

  7. OAIP 8/29/11 FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA)

    E-Print Network [OSTI]

    Droegemeier, Kelvin K.

    OFFICE OF ACADEMIC INTEGRITY PROGRAMS FERPA *20 U.S.C. § 1232(g)+ generally prohibits the release to anyone listed on this form. Please indicate the relationship of each person to the student (e.g. parent information by the Office of Academic Integrity Programs & the Provost at the University of Oklahoma, to those

  8. Microsoft Word - Declaration of Identity form for Privacy Act Requests.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGE OF PAGESpersonal March 3,ORP-2003-14, Rev.June5

  9. LM Records Handling System-Freedom of Information/Privacy Act, Office of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResource and JobLCLSLM News Archive LM NewsLegacyLegacy

  10. How to Submit a Privacy Act Request | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighlandWorkshop-SummerHow is the ScienceHow to Submit

  11. Privacy Act Advisory | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . . . .

  12. ARM - Recovery Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecovery Act Recovery Act Logo Subscribe FAQs Recovery Act

  13. Radiation Management Act (Oklahoma)

    Broader source: Energy.gov [DOE]

    This Act establishes The Department of Environmental Quality as the designated official agency of the State of Oklahoma for all regulatory activities for the use of atomic energy and sources of...

  14. Energy and Water Act

    Broader source: Energy.gov (indexed) [DOE]

    Letter 2004-02 - FY 2004 Le2islation Provisions (dated March 1.2004) Energy and Water Act AL-2004-02 provides guidance regarding the implementation of Section 30 I. 304....

  15. Paperwork Reduction Act

    Broader source: Energy.gov [DOE]

    The Paperwork Reduction Act requires that all federal websites request permission from the Office of Management and Budget (OMB) before collecting information from 10 or more members of the public....

  16. Reconciling Utility with Privacy in Genomics Mathias Humbert Erman Ayday

    E-Print Network [OSTI]

    Thévenaz, Jacques

    Reconciling Utility with Privacy in Genomics Mathias Humbert Erman Ayday Jean-Pierre Hubaux.telenti@chuv.ch ABSTRACT Direct-to-consumer genetics makes it possible for everyone to obtain their genome sequences. In order to contribute to medical research, a growing number of people publish their genomic data

  17. Privacy Enhanced Fraud Resistant Road Pricing (extended abstract)

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    for the current road tax. The announcement of the Dutch authorities stirred a large public debate which stillPrivacy Enhanced Fraud Resistant Road Pricing (extended abstract) Jaap-Henk Hoepman1,2 , George, University of Groningen, the Netherlands g.b.huitema@rug.nl Abstract. A naive implementation of a road

  18. Privacy Impact Assessment (PIA) NMAH Collections Information System

    E-Print Network [OSTI]

    Mathis, Wayne N.

    Privacy Impact Assessment (PIA) NMAH Collections Information System I. System Identification 1. IT System Name: MIMSY XG Collections Information System (CIS) 2. IT System Sponsor: National Museum Museum of American History (NMAH) Collection Information System (CIS) uses the MIMSY XG database

  19. Data Privacy and Data Security Introduction to Data Mining

    E-Print Network [OSTI]

    Zhang, Jun

    Data Privacy and Data Security Chapter 1 Introduction to Data Mining Jun Zhang January 13, 2011 © Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1 #12;Why Mine Data? Commercial Viewpoint ) © Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 2 Customer Relationship Management) #12;Why

  20. A Practical Application of Differential Privacy to Personalized Online Advertising

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Practical Application of Differential Privacy to Personalized Online Advertising Yehuda Lindell@cs.biu.ac.il,omrier@gmail.com Abstract Online advertising plays an important role in supporting many Internet services. Person- alized online advertising offers marketers a way to direct ads at very specific audiences. The vast body

  1. Targeted Advertising on the Handset: Privacy and Security Challenges

    E-Print Network [OSTI]

    Henderson, Tristan

    Targeted Advertising on the Handset: Privacy and Security Challenges Hamed Haddadi, Pan Hui, Tristan Henderson and Ian Brown Abstract Online advertising is currently a rich source of revenue for many for personalised and localised advertising. A key benefit of using mobile phones is to take advantage

  2. Notice of Privacy Practices Your Information. Your Rights. Our Responsibilities.

    E-Print Network [OSTI]

    Pittendrigh, Barry

    Notice of Privacy Practices Your Information. Your Rights. Our Responsibilities. This notice to this information. Please review it carefully. Your Rights You have the right to: · Get a copy of your paper requests · Respond to lawsuits and legal actions Your Rights When it comes to your health information, you

  3. Privacy-Preserving Friend Search over Online Social Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    characterizing one's social position and significantly impact one's daily life. Over online social networks (OSNsPrivacy-Preserving Friend Search over Online Social Networks Huang Lin , Sherman S. M. Chow Tong University Abstract--Friendships or social contacts represent an impor- tant attribute

  4. Towards Everyday Privacy for Ubiquitous Computing Scott Lederer1

    E-Print Network [OSTI]

    Mankoff, Jennifer

    with the right people at the right level of detail in ubiquitous computing environments. In this paper, weTowards Everyday Privacy for Ubiquitous Computing Scott Lederer1 , Jason I. Hong1 , Xiaodong Jiang1 , Anind K. Dey1,2 , James A. Landay3,4 , JenniferMankoff1 1 Department of Computer Science, University

  5. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    .ics.utsa.edu Institute for Cyber Security The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu Institute for Cyber Security 1 The Data and Application Security But not securable by academically taught cyber security not studied as a success story missing technologies highly

  6. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    for Cyber Security Executive Director and Endowed Chair March 29, 2012 ravi.sandhu@utsa.edu www and Privacy (DASPY) Challenge . Ravi Sandhu Institute for Cyber Security 1 and Endowed Chair March 29, 2012 growing But not securable by academically taught cyber security not studied as a success story The ATM

  7. The Optimal Mechanism in Differential Privacy: Multidimensional Setting

    E-Print Network [OSTI]

    Viswanath, Pramod

    1 The Optimal Mechanism in Differential Privacy: Multidimensional Setting Quan Geng, and Pramod Email: {geng5, pramodv}@illinois.edu Abstract We derive the optimal -differentially private mechanism multidimensional staircase-shaped probability density function. Compared with the Laplacian mechanism, we show

  8. Maintaining Trajectory Privacy in Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    properties. The users of this network are oil companies with their own mobile collectors. Since packets and read the contexts of them. The mote-level assumption is fair enough since otherwise analytically no defense system can maintain the privacy of mobile sink node. With this assumption, attacks

  9. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved POLICY TITLE: Information Technology Security Policy POLICY PURPOSE: The purpose of this Information Technology Security Policy is to ensure and describe the steps necessary to secure information

  10. Housing & Residence Life Freedom of Information and Protection of Privacy

    E-Print Network [OSTI]

    Northern British Columbia, University of

    Housing & Residence Life Freedom of Information and Protection of Privacy Housing and Residence an Yes No Provide Housing account information necessary to allow them to make housing related payments on my behalf. Yes No Provide details of other Yes No Receive information to complete my Housing

  11. Privacy in encrypted content distribution using private broadcast encryption

    E-Print Network [OSTI]

    Waters, Brent

    @cs.stanford.edu Dan Boneh dabo@cs.stanford.edu Brent Waters bwaters@cs.stanford.edu Abstract In many contentPrivacy in encrypted content distribution using private broadcast encryption Adam Barth abarth distribution systems it is important to both restrict access of content to au- thorized users and to protect

  12. The Post Anachronism: The Temporal Dimension of Facebook Privacy

    E-Print Network [OSTI]

    Bauer, Lujo

    The Post Anachronism: The Temporal Dimension of Facebook Privacy Lujo Bauer , Lorrie Faith Cranor the audience and emphasis of Facebook posts change over time. In a 63-participant longitudinal study, par- ticipants gave their audience and emphasis preferences for up to ten of their Facebook posts in the week

  13. Collateral damage of Facebook Apps: an enhanced privacy scoring model

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Collateral damage of Facebook Apps: an enhanced privacy scoring model Iraklis Symeonidis1 , Filipe relationships on Facebook often entails in- formation sharing which is based on the social trust and implicit con- tract between users and their friends. In this context, Facebook of- fers applications (Apps

  14. Framework for Security and Privacy in Automotive Telematics

    E-Print Network [OSTI]

    Gruteser, Marco

    Framework for Security and Privacy in Automotive Telematics Sastry Duri, Marco Gruteser, Xuan Liu Skyline Drive Hawthorne, New York 10532 ABSTRACT Automotive telematics may be defined as the information of data to obtain remote services. In order for automotive telematics to grow to its full potential

  15. Enhancing Privacy and Preserving Accuracy of a Distributed Collaborative Filtering

    E-Print Network [OSTI]

    Ricci, Francesco

    ) is a powerful technique for generating personalized predictions. CF systems are typically based on a central profiles combined with data modification techniques may mitigate some privacy issues. Results University of Haifa, Israel slavax@cs.haifa.ac.il Yaniv Eytani University of Illinois at Urbana

  16. Enhancing Privacy while Preserving the Accuracy of Collaborative Filtering

    E-Print Network [OSTI]

    Ricci, Francesco

    of user profiles combined with data perturbation techniques mitigates the privacy issues. Experi- ments that perturbation techniques did not considerably reduce the accuracy of the generated predictions. This paper. Collaborative Filtering (CF) is considered a powerful technique for generating personalized recommendations

  17. CS689: Privacy and Security in Data Analysis

    E-Print Network [OSTI]

    Zhang, Jun

    Instructor: Jun Zhang. E-mail: jzhang@cs.uky.edu. Tel: 257­3892. Office: Marksbury 321. Office Hours: MW: 9 is released to public or is subject to computer-based analysis, such as data mining. Prerequisites: Two 500 on Privacy Preserving Data Mining. Topical outline (tentative): · Brief introduction to data mining

  18. Data Distortion for Privacy Protection in a Terrorist Analysis System

    E-Print Network [OSTI]

    Zhang, Jun

    in security-related data mining applications, such as in data mining- based terrorist analysis systems. We in preserving privacy as well as maintaining utility of the datasets. 1 Introduction The use of data mining's Terrorism Information Awareness Program led to the defunding of DARPA's Information Awareness Office. Thus

  19. Obligations with deadlines and maintained interdictions in privacy regulation frameworks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , research has first fo- cused on the so-called Privacy-Enhancing Technologies (PETs), the technical means existing Internet-oriented PETs with respect to their aims (identity management, IP anonymization...) [6 (user information, user consent, data update and retractation, process justification, data retention

  20. Comprehensive Municipal Solid Waste Management, Resource Recovery, and Conservation Act (Texas)

    Broader source: Energy.gov [DOE]

    This Act encourages the establishment of regional waste management facilities and the cooperation of local waste management entities in order to streamline the management of municipal solid waste...

  1. Massachusetts Clean Air Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    The Act contains regulations to prevent the pollution and contamination of the atmosphere. The Act establishes a contiguous metropolitan pollution control district, comprised of towns in the...

  2. Recovery Act State Memos Virginia

    Energy Savers [EERE]

    * VIRGINIA RECOVERY ACT SNAPSHOT Virginia has substantial natural resources, including coal and natural gas. The American Recovery & Reinvestment Act (ARRA) is making a...

  3. ARM - Recovery Act Instruments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Comments?govInstrumentsnoaacrnBarrow, Alaska OutreachCalendarPress Releases Related2ActRecovery Act Instruments

  4. Privacy and identifiability in clinical research, personalized medicine, and public health surveillance

    E-Print Network [OSTI]

    Cassa, Christopher A

    2008-01-01

    Electronic transmission of protected health information has become pervasive in research, clinical, and public health investigations, posing substantial risk to patient privacy. From clinical genetic screenings to publication ...

  5. National Weatherization Assistance Program Characterization Describing the Recovery Act Period

    SciTech Connect (OSTI)

    Tonn, Bruce Edward; Rose, Erin M.; Hawkins, Beth A.

    2015-10-01

    This report characterizes the U.S. Department of Energy s Weatherization Assistance Program (WAP) during the American Recovery and Reinvestment Act of 2009 (Recovery Act) period. This research was one component of the Recovery Act evaluation of WAP. The report presents the results of surveys administered to Grantees (i.e., state weatherization offices) and Subgrantees (i.e., local weatherization agencies). The report also documents the ramp up and ramp down of weatherization production and direct employment during the Recovery Act period and other challenges faced by the Grantees and Subgrantees during this period. Program operations during the Recovery Act (Program Year 2010) are compared to operations during the year previous to the Recovery Act (Program Year 2008).

  6. Protecting Privacy of Shared Epidemiologic Data without Compromising Analysis Potential

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Cologne, John; Grant, Eric J.; Nakashima, Eiji; Chen, Yun; Funamoto, Sachiyo; Katayama, Hiroaki

    2012-01-01

    Objective . Ensuring privacy of research subjects when epidemiologic data are shared with outside collaborators involves masking (modifying) the data, but overmasking can compromise utility (analysis potential). Methods of statistical disclosure control for protecting privacy may be impractical for individual researchers involved in small-scale collaborations. Methods . We investigated a simple approach based on measures of disclosure risk and analytical utility that are straightforward for epidemiologic researchers to derive. The method is illustrated using data from the Japanese Atomic-bomb Survivor population. Results . Masking by modest rounding did not adequately enhance security but rounding to remove several digits ofmore »relative accuracy effectively reduced the risk of identification without substantially reducing utility. Grouping or adding random noise led to noticeable bias. Conclusions . When sharing epidemiologic data, it is recommended that masking be performed using rounding. Specific treatment should be determined separately in individual situations after consideration of the disclosure risks and analysis needs. « less

  7. Privacy Impact Assessment Template and Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report Appendices | Department ofPrioritization ToolPrivacy Impact

  8. Privacy Principles for Sharing Cyber Security Data Gina Fisk, Calvin Ardi, Neale Pickett, John Heidemann, Mike Fisk, Christos Papadopoulos

    E-Print Network [OSTI]

    Heidemann, John

    Privacy Principles for Sharing Cyber Security Data Gina Fisk, Calvin Ardi, Neale Pickett, John@colostate.edu Abstract--Sharing cyber security data across organizational boundaries brings both privacy risks for sharing cyber security information must consider privacy issues as they exchange and analyzed information

  9. Why Do Privacy-Enhancement Mechanisms Fail, After All? A Survey of Both the User and the Provider Perspective

    E-Print Network [OSTI]

    Buchmann, Erik

    provider and user: Legal regulations, and privacy enhancement technologies (PET). International data implement information collection and forwarding processes that are not transparent to the user. This even for future privacy-enhancement technologies. 1. INTRODUCTION Currently, the Internet challenges the privacy

  10. "Think Global -Act Local": A Descriptive Analysis of Environmental

    E-Print Network [OSTI]

    Zeng, Ning

    on the environmental- political agenda of the Israeli society. EMO's, Environmentalism, GreenPeace, Israeli KEYWORDS ABSTRACT #12;3 Public activity concerning environmental issues is assuming an increasingly. As such, the primary issues dealt with by the research to date on environmental protest movements

  11. Recovery Act: Local Energy Assurance Planning Initiatives | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report Appendices |ProjectKnow YourDepartment

  12. Georgia Shore Assistance Act

    SciTech Connect (OSTI)

    Pendergrast, C.

    1984-01-01

    The Georgia General Assembly passed the Shore Assistance Act in 1979 in order to fill a regulatory gap in the state's management of its coastal resources. A review of its legislative history, purposes, applications, and effects in terms of the sand sharing system of sand dunes, beaches, sandbars, and shoals concludes that the Act is poorly drafted. In its application on the oceanfront, it betrays its intent and protects the oceanfront owner. It has failed to satisfy the requirements of the public trust in the tidal foreshore. Amendments to clarify its understanding of the functions and values of the sand-sharing system should also conform with the state's duties under the public trust. 139 references.

  13. Toxic Substances Control Act

    SciTech Connect (OSTI)

    Not Available

    1992-05-15

    This Reference Book contains a current copy of the Toxic Substances Control Act and those regulations that implement the statute and appear to be most relevant to DOE activities. The document is provided to DOE and contractor staff for informational purposes only and should not be interpreted as legal guidance. Questions concerning this Reference Book may be directed to Mark Petts, EH-231 (202/586-2609).

  14. Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts

    E-Print Network [OSTI]

    Queitsch, Christine

    Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts Page 1 of 16 Document Name: Information Security and Privacy Laws Version #: vF Created By: Ann Nagel, Associate Chief Information Security Officer Date Created: June 2, 2009 Updated By: Melissa Albin-Wurzer, Education

  15. Kennedy Krieger Institute is committed to the privacy and confidentiality of your medical

    E-Print Network [OSTI]

    Pevsner, Jonathan

    Kennedy Krieger Institute is committed to the privacy and confidentiality of your medical, or by contacting the Kennedy Krieger Institute Privacy Officer as explained at the end of this notice. It also have. The revised notice will be available online at kennedykrieger.org. Kennedy Krieger's Notice

  16. A Roadmap For Comprehensive Online Privacy Policy Annie I. Antn (*), Elisa Bertino (**), Ninghui Li (**), Ting Yu

    E-Print Network [OSTI]

    Yu, Ting

    framework that covers the entire privacy policy life-cycle is needed. This life-cycle includes enterprise that supports the privacy policy life-cycle. We identify the relevant technological and non-technical components required to support this life-cycle, showing the relationships between these components. The framework

  17. Building a Secure and Privacy-Preserving Smart Grid Cornell University

    E-Print Network [OSTI]

    Jelasity, Márk

    in the electrical power grid promise to create a more efficient, cost-effective, and adaptable smart grid. HoweverBuilding a Secure and Privacy-Preserving Smart Grid Ken Birman Cornell University Márk Jelasity, naive implementations of smart grid data collection could jeopardize the privacy of consumers

  18. UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid Xiaohui Liang, Student for smart grid in a community environment, which enables the electricity price to correspond-preserving manner. Index Terms--Smart grid; dynamic price; privacy preserva- tion; community-specific I

  19. Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud storage"

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud security in cloud computing" proposed by Wang et al. is insecure and their second work "privacy- preserving public auditing for secure cloud the storage" is inefficient. Thus, they offered a secure and efficient

  20. Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done?

    E-Print Network [OSTI]

    Sandhu, Ravi

    Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu-Leading Research with Real Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done Cloud Computing: Dependability Security What is Not New Security Guess who wins?! © Ravi Sandhu World

  1. Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage

    E-Print Network [OSTI]

    for sensitive data over cloud storage. However, users desire better security and are ready to pay for services storage systems. General Terms Human Factors, Security, Privacy. Keywords Cloud Storage, Social FactorsHome is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage Iulia Ion , Niharika

  2. Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy Wang Shao privacy and is secure in the random oracle model. Keywords: Cloud Computing, Cloud Storage, Public University of Posts and Telecommunications, Nanjing 210046, China; 2 Network and Data Security Key Laboratory

  3. Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?

    E-Print Network [OSTI]

    Sankar, Lalitha

    Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information? Lalitha unequivocally how safe private data can be (privacy) while still providing useful benefit (utility) to multiple such a framework which includes the following: modeling of data sources, developing application independent utility

  4. Introduction to SCRIPT-ed Special Edition on Privacy and Technology 

    E-Print Network [OSTI]

    Edwards, Lilian

    2006-01-01

    Introduction to a special edition of SCRIPT-ed online journal focussing on the regulation of privacy, in light of new and changing technologies. The edition discusses privacy as a human right, or as a commodity, and presents articles from invited...

  5. Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM (Extended Abstract a client to securely outsource his private data to the cloud while at the same time to delegate to a third party the right to run certain algorithms on his data. The mechanism is privacy-preserving, meaning

  6. Using Time-of-Flight Measurements for Privacy-Preserving Tracking in a Smart Room

    E-Print Network [OSTI]

    Radke, Rich

    for human assistance, or even detect anomalies in occupant behavior (e.g., alerting staff if an occupant-of-flight images are severely downsampled to preserve the privacy of the occupants and simulate future applications-of-flight, smart room, pose recognition, visual tracking, privacy preservation, occupancy detection I. INTRODUCTION

  7. Efficient, Context-Aware Privacy Leakage Confinement for Android Applications without Firmware Modding

    E-Print Network [OSTI]

    Yin, Heng

    Efficient, Context-Aware Privacy Leakage Confinement for Android Applications without Firmware of EECS Syracuse University Syracuse, USA heyin@syr.edu ABSTRACT As Android has become the most prevalent operating system in mo- bile devices, privacy concerns in the Android platform are increas- ing. A mechanism

  8. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    IccTA: Detecting Inter-Component Privacy Leaks in Android Apps Li Li, Alexandre Bartel, Tegawend if those are in different components. Since Android applications may leak private data carelessly or maliciously, we propose IccTA, a static taint analyzer to detect privacy leaks among components in Android

  9. Liberty Alliance Project: Version: 1.0 Liberty ID-WSF Security and Privacy

    E-Print Network [OSTI]

    Landau, Susan

    Liberty Alliance Project: Version: 1.0 Liberty ID-WSF Security and Privacy OverviewVersion: 1-idwsf-security-privacy-overview-v1.0.pdf Liberty Alliance Project 1 #12;Liberty Alliance Project: Version: 1.0 Liberty ID Alliance. Permission is hereby granted to11 use the document solely for the purpose of implementing

  10. PRIVACY POLICY AND PROCEDURES Policy #: 2100.2 LSU Health Sciences Center New Orleans Page: 1

    E-Print Network [OSTI]

    PRIVACY POLICY AND PROCEDURES Policy #: 2100.2 LSU Health Sciences Center New Orleans Page: 1 Date Effective: April 14, 2003 Patient Information Policy Privacy Official and Complaint Contact SCOPE: All, are referred to in this policy as LSUHSC-NO. PURPOSE: To establish the requirements and guidelines for each

  11. Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies Emil called Policy-Enhanced Private Set Intersection (PPSI), allowing two parties to share information while enforcing the de- sired privacy policies. Our constructions require minimal additional overhead over

  12. Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms Kan Yang, Xiaohua Jia-preserving data publish- subscribe service for cloud-based platforms. Specifically, we first formulate the problem of privacy-preserving data publish- subscribe service by refining its security requirements on cloud- based

  13. Trustees of the University of Pennsylvania Top 10 Facebook Privacy Settings

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    © Trustees of the University of Pennsylvania Top 10 Facebook Privacy Settings This document describes important settings on Facebook to help you protect your privacy. Bear in mind that Facebook is a powerful interactive tool with significant and often complicated sharing capabilities. Also, Facebook often

  14. A Privacy Preservation Model for Facebook-Style Social Network Systems

    E-Print Network [OSTI]

    A Privacy Preservation Model for Facebook-Style Social Network Systems Philip W. L. Fong1 , Mohd network systems, with Facebook being an archetypical example. The access control paradigm behind the privacy preservation mechanism of Facebook is dis- tinctly different from such existing access control

  15. A Privacy Preservation Model for Facebook-like Social Network Systems

    E-Print Network [OSTI]

    Regina, University of

    A Privacy Preservation Model for Facebook-like Social Network Systems Philip W. L. Fong, Mohd Anwar-0-7731-0659 (print) ISBN 978-0-7731-0660 (online) #12;A Privacy Preservation Model for Facebook-Like Social Network growth in the popularity of social network systems, with Facebook being an archetypical example. Due

  16. Quantifying Location Privacy Leakage from Transaction Prices Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Quantifying Location Privacy Leakage from Transaction Prices Arthur Gervais, Hubert Ritzdorf, Mario potential privacy risks that are difficult to foresee. In this paper we study the impact that the prices a small set of low-priced product prices from the consumers' purchase histories, an adversary can de

  17. Pollution Control Act (South Carolina)

    Broader source: Energy.gov [DOE]

    This Act declares the maintenance of reasonable standards of purity of air and water to be the public policy of the state. The Act authorizes the Department of Health and Environmental Control to...

  18. New York Recovery Act Snapshot

    Broader source: Energy.gov [DOE]

    The American Recovery & Reinvestment Act (ARRA) is making a meaningful down payment on the nation's energy and environmental future. The Recovery Act investments in New York are supporting a...

  19. Recovery Act milestone: Excavation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100 Winners * Impacts onReal-TimeRecord-SettingAct Workforcemilestone:

  20. Manager's Signature Log Privacy Impact Assessment, Office of...

    Energy Savers [EERE]

    PIA - Tour Tracker Energy Employees' Occupational Illness Compensation Program Act (EEOICPA) Tracking Database, INL Energy Employees' Occupational Illness Compensation Program...

  1. Triple acting radial seal

    DOE Patents [OSTI]

    Ebert, Todd A (West Palm Beach, FL); Carella, John A (Jupiter, FL)

    2012-03-13

    A triple acting radial seal used as an interstage seal assembly in a gas turbine engine, where the seal assembly includes an interstage seal support extending from a stationary inner shroud of a vane ring, the interstage seal support includes a larger annular radial inward facing groove in which an outer annular floating seal assembly is secured for radial displacement, and the outer annular floating seal assembly includes a smaller annular radial inward facing groove in which an inner annular floating seal assembly is secured also for radial displacement. A compliant seal is secured to the inner annular floating seal assembly. The outer annular floating seal assembly encapsulates the inner annular floating seal assembly which is made from a very low alpha material in order to reduce thermal stress.

  2. Wetlands protection acts: a closer look 

    E-Print Network [OSTI]

    Linton, Margaret Temple

    1983-01-01

    of project. Recommended: Delaware (C), and Oregon (C). Required: New Jersey (C, D), and Pennsylvania (C, D). Im act of Su ort1n Structures Only Delaware specifically requests that any impact of support1ng structures or other support facilities associated... or impact the project/activity will have on the sur- rounding or local areas. Recommended: Mich1gan, Maryland, M1ssissippi, Delaware, South Required: Carolina, Virgin1a, and New York. Pennsylvania. Proximit to Other Waterwa s Under this criter1on...

  3. Recovery Act Workforce Development | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Announces Nearly 100 Million for Smart Grid Workforce Training and Development. Congressional Testimony Recovery Act Recovery Act Interoperability Recovery Act SGIG...

  4. Michael R. Maraya (Acting) | Department of Energy

    Office of Environmental Management (EM)

    R. Maraya (Acting) About Us Michael R. Maraya (Acting) - Deputy CIO for Enterprise Policy, Portfolio Management & Governance Mike Maraya is the Acting Deputy CIO for Enterprise...

  5. Commercial and Multifamily Building Tenant Energy Usage Aggregation and Privacy

    SciTech Connect (OSTI)

    Livingston, Olga V.; Pulsipher, Trenton C.; Wang, Na

    2014-11-17

    In a number of cities and states, building owners are required to disclose and/or benchmark their building energy use. This requires the building owner to possess monthly whole-building energy usage information, which can be challenging for buildings in which individual tenants have their own utility meters and accounts with the utility. Some utilities and utility regulators have turned to aggregation of customer data as a way to give building owners the whole-building energy usage data while protecting customer privacy. However, no utilities or regulators appear to have conducted a concerted statistical, cybersecurity, and privacy analysis to justify the level of aggregation selected. Therefore, the Tennant Data Aggregation Task was established to help utilities address these issues and provide recommendations as well as a theoretical justification of the aggregation threshold. This study is focused on the use case of submitting data for ENERGY STAR Portfolio Manager (ESPM), but it also looks at other potential use cases for monthly energy consumption data.

  6. Double acting bit holder

    DOE Patents [OSTI]

    Morrell, Roger J. (Blommington, MN); Larson, David A. (Minneapolis, MN); Ruzzi, Peter L. (Eagan, MN)

    1994-01-01

    A double acting bit holder that permits bits held in it to be resharpened during cutting action to increase energy efficiency by reducing the amount of small chips produced. The holder consist of: a stationary base portion capable of being fixed to a cutter head of an excavation machine and having an integral extension therefrom with a bore hole therethrough to accommodate a pin shaft; a movable portion coextensive with the base having a pin shaft integrally extending therefrom that is insertable in the bore hole of the base member to permit the moveable portion to rotate about the axis of the pin shaft; a recess in the movable portion of the holder to accommodate a shank of a bit; and a biased spring disposed in adjoining openings in the base and moveable portions of the holder to permit the moveable portion to pivot around the pin shaft during cutting action of a bit fixed in a turret to allow front, mid and back positions of the bit during cutting to lessen creation of small chip amounts and resharpen the bit during excavation use.

  7. Solid Waste Management Act (Pennsylvania)

    Broader source: Energy.gov [DOE]

    This Act provides for the planning and regulation of solid waste storage, collection, transportation, processing, treatment, and disposal. It requires that municipalities submit plans for municipal...

  8. NIST Organic Act National Institute of Standards and Technology Act

    E-Print Network [OSTI]

    Magee, Joseph W.

    -effectiveness. (2) Precise measurements, calibrations and standards help United States industry and manufacturingNIST Organic Act National Institute of Standards and Technology Act SECTION 1. FINDINGS and measurement standards needed to improve quality and reliability, and (B) new technological processes by which

  9. National Environmental Policy Act (NEPA) Categorically Excluded...

    Office of Environmental Management (EM)

    NEPA National Environmental Policy Act (NEPA) Categorically Excluded Actions National Environmental Policy Act (NEPA) Categorically Excluded Actions Categorical Exclusions (CX)...

  10. Teaching in computer security and privacy The Computer Laboratory's undergraduate and masters programmes

    E-Print Network [OSTI]

    Crowcroft, Jon

    computing security · Economics of cybercrime · Economics of information security · Formal methods · Hardware security · Location and positioning systems · Malware analysis · Medical information security · MobileTeaching in computer security and privacy The Computer Laboratory's undergraduate and masters

  11. Privacy in context : the costs and benefits of a new deidentification method

    E-Print Network [OSTI]

    Trepetin, Stanley

    2006-01-01

    The American public continues to be concerned about medical privacy. Policy research continues to show people's demand for health organizations to protect patient-specific data. Health organizations need personally ...

  12. Data Privacy and the Smart Grid: A Voluntary Code of Conduct...

    Energy Savers [EERE]

    (VCC) - Draft for Public Comment (September 2014) Data Privacy and the Smart Grid: A Voluntary Code of Conduct (VCC) - Draft for Public Comment (September 2014) In January 2012, OE...

  13. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    SciTech Connect (OSTI)

    Rothstein, M.A.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  14. A Regulator’s Privacy Guide to Third-Party Data Access for Energy Efficiency

    SciTech Connect (OSTI)

    Customer Information and Behavior Working Group

    2012-12-20

    Summarizes approaches taken by states on privacy and security issues related to third-party access to customer data and provides guidance on policy options for providing access to customer data.

  15. Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries.pettai@ut.ee, peeter.laud@cyber.ee Abstract We describe an automatic analysis to check secure multiparty computation

  16. Commercial Building Tenant Energy Usage Data Aggregation and Privacy: Technical Appendix

    SciTech Connect (OSTI)

    Livingston, Olga V.; Pulsipher, Trenton C.; Anderson, David M.

    2014-11-12

    This technical appendix accompanies report PNNL–23786 “Commercial Building Tenant Energy Usage Data Aggregation and Privacy”. The objective is to provide background information on the methods utilized in the statistical analysis of the aggregation thresholds.

  17. Privacy preservation and auditing for ubiquitous mobile sensing applications and services

    E-Print Network [OSTI]

    Sumter, George C. (George Cody)

    2012-01-01

    The recent proliferation of mobile phones, with their many associated sensors, has opened the door to an entirely new range of insights and applications with a host of accompanying privacy concerns. In this thesis, we ...

  18. Biomass Program Recovery Act Factsheet

    SciTech Connect (OSTI)

    2010-03-01

    The Biomass Program has awarded about $718 million in American Recovery and Reinvestment Act (Recovery Act) funds. The projects the Program is supporting are intended to: Accelerate advanced biofuels research, development, and demonstration; Speed the deployment and commercialization of advanced biofuels and bioproducts; Further the U.S. bioindustry through market transformation and creating or saving a range of jobs.

  19. Recovery Act – Transportation Electrification

    SciTech Connect (OSTI)

    Gogineni, Kumar

    2013-12-31

    ChargePoint America demonstrated the viability, economic and environmental benefits of an electric vehicle-charging infrastructure. Electric vehicles (EVs) and plug-in electric vehicles (PHEVs) arrived in late 2010, there was a substantial lack of infrastructure to support these vehicles. ChargePoint America deployed charging infrastructure in ten (10) metropolitan regions in coordination with vehicle deliveries targeting those same regions by our OEM partners: General Motors, Nissan, Fisker Automotive, Ford, smart USA, and BMW. The metropolitan regions include Central Texas (Austin/San Antonio), Bellevue/Redmond (WA), Southern Michigan, Los Angeles area (CA), New York Metro (NY), Central Florida (Orlando/Tampa), Sacramento (CA), San Francisco/San Jose (CA), Washington DC and Boston (MA). ChargePoint America installed more than 4,600 Level 2 (220v) SAE J1772™ UL listed networked charging ports in home, public and commercial locations to support approximately 2000 program vehicles. ChargePoint collected data to analyze how individuals, businesses and local governments used their vehicles. Understanding driver charging behavior patterns will provide the DoE with critical information as EV adoption increases in the United States.

  20. Commercial Building Tenant Energy Usage Aggregation and Privacy

    SciTech Connect (OSTI)

    Livingston, Olga V.; Pulsipher, Trenton C.; Anderson, David M.; Wang, Na

    2014-10-31

    A growing number of building owners are benchmarking their building energy use. This requires the building owner to acquire monthly whole-building energy usage information, which can be challenging for buildings in which individual tenants have their own utility meters and accounts with the utility. Some utilities and utility regulators have turned to aggregation of customer energy use data (CEUD) as a way to give building owners whole-building energy usage data while protecting customer privacy. Meter profile aggregation adds a layer of protection that decreases the risk of revealing CEUD as the number of meters aggregated increases. The report statistically characterizes the similarity between individual energy usage patterns and whole-building totals at various levels of meter aggregation.

  1. Local Universities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCenter (LMI-EFRC) ProximityCenterLeeincreasesLocal

  2. Local Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResourcelogo and-E CChinaC L S C OLocal Information Local

  3. Texas Clean Air Act (Texas)

    Broader source: Energy.gov [DOE]

    This Act is designed to safeguard the state's air resources from pollution by requiring the control and abatement of air pollution and emissions of air contaminants, consistent with the protection...

  4. Tennessee Air Quality Act (Tennessee)

    Broader source: Energy.gov [DOE]

    The Tennessee Air Quality Act (AQA) delegates the power to maintain air quality in the State to the Department of Environment and Conservation. Under the Department of the Environment and...

  5. Wyoming Recovery Act State Memo

    Broader source: Energy.gov [DOE]

    Wyoming has substantial natural resources including coal, natural gas, oil, and wind power. The American Recovery & Reinvestment Act (ARRA) is making a meaningful down payment on the nation’s...

  6. Wisconsin Recovery Act State Memo

    Office of Energy Efficiency and Renewable Energy (EERE)

    Wisconsin has substantial natural resources, including biomass and hydroelectric power. The American Recovery & Reinvestment Act (ARRA)is making a meaningful down payment on the nation’s energy...

  7. National Environmental Policy Act RM

    Office of Environmental Management (EM)

    National Environmental Policy Act Review Module March 2010 CD- N -0 OFFICE O National E C CD-1 OF ENVIRO Standa Environm Rev Critical Deci CD-2 M ONMENTA ard Review mental P view...

  8. Recovery Act | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data CenterFinancialInvesting inServicesRecovery Act » Recovery Act

  9. Local Option - Renewable Energy Financing District/Solar Energy...

    Broader source: Energy.gov (indexed) [DOE]

    your local government to find out if it has established a PACE financing program.) Renewable Energy Financing District Act New Mexico enacted S.B. 647 in 2009, which...

  10. [1975] Unique factorization in complete local rings.pdf

    E-Print Network [OSTI]

    cycles which are (scheme-theoretically) the complete intersection of V with a hypersurface of the ..... Recall that a noetherian local ring R with maximal ideal m is .... HOCHSTER, J. L. ROBERTS, Rings of invariants of reductive groups acting on ...

  11. 29.01.03.M1.17 Information Resources Privacy Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    for university information resources. Reason The University has the right to examine information on information29.01.03.M1.17 Information Resources ­ Privacy Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.17 Information Resources ­ Privacy Approved July 18, 2005 Revised December 4, 2009 Revised August

  12. CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap Levente Buttyan Mark Felegyhazi Boldizsar Bencsath

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap Levente Butty´an M´ark F and user privacy. This paper shows a research roadmap of the CrySyS Lab from its inception in 2003 until Internet. The objective of this paper is to define a research roadmap to realize this goal. II. WHERE WE

  13. 3. Security and privacy David Keil Information Technology and Society 5/13 David M. Keil, Framingham State University

    E-Print Network [OSTI]

    Keil, David M.

    3. Security and privacy David Keil Information Technology and Society 5/13 David M. Keil, Framingham State University CSCI 135 Information Technology and Society 3. Security and privacy 1. Crime, law protections David Keil Information Technology and Society 5/13 1 Readings: Baase, Chapters 2 and 5 David Keil

  14. Geographic Privacy-aware Knowledge Discovery Fosca Giannotti2, Mirco Nanni2, Dino Pedreschi1, and Chiara Renso2

    E-Print Network [OSTI]

    Malerba, Donato

    , based on new privacy- preserving methods for extracting knowledge from large amounts of raw data ref in the advocated form of geographic knowledge a key driver, such as in transport, environment and risk management and sys- tems for knowledge discovery and delivery, based on new automated privacy-preserving methods

  15. Kathleen Carlson Appointed Interim Acting Deputy Administrator...

    National Nuclear Security Administration (NNSA)

    Interim Acting Deputy Administrator for Defense Programs Press Release Aug 16, 2001 Kathleen Carlson Appointed Interim Acting Deputy Administrator for Defense Programs...

  16. Federal Information Technology Acquisition Reform Act (FITARA...

    Energy Savers [EERE]

    Information Technology Acquisition Reform Act (FITARA) Data Resources Federal Information Technology Acquisition Reform Act (FITARA) Data Resources FITARA Resources Available for...

  17. Quantum Locality?

    SciTech Connect (OSTI)

    Stapp, Henry

    2011-11-10

    Robert Griffiths has recently addressed, within the framework of a ‘consistent quantum theory’ (CQT) that he has developed, the issue of whether, as is often claimed, quantum mechanics entails a need for faster-than-light transfers of information over long distances. He argues, on the basis of his examination of certain arguments that claim to demonstrate the existence of such nonlocal influences, that such influences do not exist. However, his examination was restricted mainly to hidden-variable-based arguments that include in their premises some essentially classical-physics-type assumptions that are fundamentally incompatible with the precepts of quantum physics. One cannot logically prove properties of a system by attributing to the system properties alien to that system. Hence Griffiths’ rejection of hidden-variable-based proofs is logically warranted. Griffiths mentions the existence of a certain alternative proof that does not involve hidden variables, and that uses only macroscopically described observable properties. He notes that he had examined in his book proofs of this general kind, and concluded that they provide no evidence for nonlocal influences. But he did not examine the particular proof that he cites. An examination of that particular proof by the method specified by his ‘consistent quantum theory’ shows that the cited proof is valid within that restrictive framework. This necessary existence, within the ‘consistent’ framework, of long range essentially instantaneous influences refutes the claim made by Griffiths that his ‘consistent’ framework is superior to the orthodox quantum theory of von Neumann because it does not entail instantaneous influences. An added section responds to Griffiths’ reply, which cites a litany of ambiguities that seem to restrict, devastatingly, the scope of his CQT formalism, apparently to buttress his claim that my use of that formalism to validate the nonlocality theorem is flawed. But the vagaries that he cites do not upset the proof in question. It is show here in detail why the precise statement of this theorem justifies the specified application of CQT. It is also shown, in response to his challenge, why a putative proof of locality that he has proposed is not valid.

  18. FOIA Update: The Freedom of Information Act, 5 U.S.C. sect. 552, As Amended By Public Law No. 104-

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergy Technologies | Blandinenewsand Privacy Act

  19. Localization via Automorphisms of the CARs. Local gauge invariance

    E-Print Network [OSTI]

    Hendrik Grundling; Karl-Hermann Neeb

    2010-01-07

    The classical matter fields are sections of a vector bundle E with base manifold M. The space L^2(E) of square integrable matter fields w.r.t. a locally Lebesgue measure on M, has an important module action of C_b^\\infty(M) on it. This module action defines restriction maps and encodes the local structure of the classical fields. For the quantum context, we show that this module action defines an automorphism group on the algebra A, of the canonical anticommutation relations on L^2(E), with which we can perform the analogous localization. That is, the net structure of the CAR, A, w.r.t. appropriate subsets of M can be obtained simply from the invariance algebras of appropriate subgroups. We also identify the quantum analogues of restriction maps. As a corollary, we prove a well-known "folk theorem," that the algebra A contains only trivial gauge invariant observables w.r.t. a local gauge group acting on E.

  20. Multi-node Coordinated Jamming for Location Privacy Protection

    E-Print Network [OSTI]

    Gruteser, Marco

    precisely locate the target nodes. Although basic anti-localization techniques based on power control's localization systems. However, such a jamming technique has the problem of interfering with the communication such interference problems, those techniques generally induce co- ordination problems or require encryption

  1. Clean Air Act. Revision 5

    SciTech Connect (OSTI)

    Not Available

    1994-02-15

    This Reference Book contains a current copy of the Clean Air Act, as amended, and those regulations that implement the statute and appear to be most relevant to DOE activities. The document is provided to DOE and contractor staff for informational purposes only and should not be interpreted as legal guidance. This Reference Book has been completely revised and is current through February 15, 1994.

  2. Recovery Act State Memos Tennessee

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProject Developsfor UCNIEnvironmental Impact StatementRecovery Act Smart

  3. Recovery Act State Memos California

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo. 195 - Oct. 7,DOERTI | Department8Recovery ActCalifornia For

  4. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  5. Distributed controller design for a class of sparse singular systems with privacy constraints

    E-Print Network [OSTI]

    Hirche, Sandra

    is the desire to ensure privacy of subsystems. This gives motivation for the presented distributed controller is the presence of algebraic conservation constraints, for example in terms of energy or mass flow. Therefore subsystem or to some centralized entity. In the power system, for example, the intro- duction of smart

  6. Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns

    E-Print Network [OSTI]

    Hengartner, Urs

    , most browsers allow user to delete cookies, and a privacy-conscious user might choose to do so after mode offered by most modern browsers, effectively blocking some information from being sent out. Recent protection for Internet users has been identified as a major problem in modern web browsers. Despite poten

  7. A Toolkit for Managing Enterprise Privacy Policies Michael Backes, Birgit Pfitzmann, and Matthias Schunter

    E-Print Network [OSTI]

    Backes, Michael

    A Toolkit for Managing Enterprise Privacy Policies Michael Backes, Birgit Pfitzmann, and Matthias proposed by IBM. The basic definition is refinement, i.e., the question whether fulfilling one policy been #12;102 Michael Backes, Birgit Pfitzmann, and Matthias Schunter collected has to govern the use

  8. Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond Scott E. Coull Red of communication among consumers around the world. Apple iMessage, for example, handles over 2 bil- lion message evaluation focuses on Apple iMessage, the attacks are completely generic and we show how they can be applied

  9. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 EPPA: An Efficient and Privacy-Preserving

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    generation plants to customers) and demand-driven response. Smart grid combines traditional grid-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Member, IEEE, Xiaohui Liang, Student. In this paper, we propose an efficient and privacy-preserving aggregation scheme, named EPPA, for smart grid

  10. SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment

    E-Print Network [OSTI]

    Madiraju, Praveen

    discovery process lightweight and secure. In this paper we present details of the trust and risk models. We of devices running in a pervasive computing environment [10]. The resource discovery process demands modelsSSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing

  11. Onions for Sale: Putting Privacy on the Market Aaron Johnson, Rob Jansen, and Paul Syverson

    E-Print Network [OSTI]

    Johnson, Aaron

    Overview Onion routing, and in particular the Tor network, is tech- nically well-designed to provideD RA FT Onions for Sale: Putting Privacy on the Market Aaron Johnson, Rob Jansen, and Paul Syverson source of trust. Proposed Solution We propose that Tor supports the optional purchase of its services

  12. A Privacy-Aware Architecture For Demand Response Systems Stephen Wicker, Robert Thomas

    E-Print Network [OSTI]

    Wicker, Stephen

    A Privacy-Aware Architecture For Demand Response Systems Stephen Wicker, Robert Thomas School architectures that realize the benefits of demand response without requiring that AMI data be centrally-based demand response efforts in the face of public outcry. We also show that Trusted Platform Modules can

  13. Supporting Network Formation through Mining under Privacy Constraints Florian Skopik, Daniel Schall, Schahram Dustdar

    E-Print Network [OSTI]

    Dustdar, Schahram

    , group formation, privacy issues, service-centric collaborations I. INTRODUCTION Small and medium-sized and small companies come together and form virtual communities to compete with global players of service-oriented architectures (SOA), interactions between partners have become observable. Monitoring col

  14. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing Marten van Dijk of computing resources. Clients' lack of direct resource control in the cloud prompts con- cern about de- manded by common cloud computing services, even with such pow- erful tools as FHE. We formally

  15. Competitive Privacy in the Smart Grid: An Information-theoretic Approach

    E-Print Network [OSTI]

    Sankar, Lalitha; Tandon, Ravi; Poor, H Vincent

    2011-01-01

    Advances in sensing and communication capabilities as well as power industry deregulation are driving the need for distributed state estimation in the smart grid at the level of the regional transmission organizations (RTOs). This leads to a new competitive privacy problem amongst the RTOs since there is a tension between sharing data to ensure network reliability (utility/benefit to all RTOs) and withholding data for profitability and privacy reasons. The resulting tradeoff between utility, quantified via fidelity of its state estimate at each RTO, and privacy, quantified via the leakage of the state of one RTO at other RTOs, is captured precisely using a lossy source coding problem formulation for a two RTO network. For a two-RTO model, it is shown that the set of all feasible utility-privacy pairs can be achieved via a single round of communication when each RTO communicates taking into account the correlation between the measured data at both RTOs. The lossy source coding problem and solution developed he...

  16. ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC

    E-Print Network [OSTI]

    ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING bodies to accelerate the federal government's secure adoption of cloud computing. NIST's goal is to foster cloud computing systems and practices; support interoperability, portability, and security

  17. Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems

    E-Print Network [OSTI]

    Gruteser, Marco

    gruteser@winlab.rutgers.edu ABSTRACT Research on smart meters has shown that fine-grained en- ergy usage data poses privacy risks since it allows inferences about activities inside homes. While smart meter for remotely collecting us- age data from electricity, gas, and water meters. Yet to the best of our knowledge

  18. Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems

    E-Print Network [OSTI]

    Xu, Wenyuan

    gruteser@winlab.rutgers.edu ABSTRACT Research on smart meters has shown that fine-grained en- ergy usage data poses privacy risks since it allows inferences about activities inside the home. While smart meter for remotely collecting us- age data from electricity, gas, and water meters. Yet to the best of our knowledge

  19. Utility of Privacy Preservation for Health Data Publishing Lengdong Wu, Hua He, Osmar R. Zaane

    E-Print Network [OSTI]

    Zaiane, Osmar R.

    Utility of Privacy Preservation for Health Data Publishing Lengdong Wu, Hua He, Osmar R. Zaïane is putting in question the utility of the health data after severe anonymization. 1. Introduction Health, they also significantly hinder the data utility for research purposes. In this paper we investigate several

  20. Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images

    E-Print Network [OSTI]

    Roe, Paul

    Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images Chaw-Seng Woo1, and tampering can be de- tected using a fragile watermark. The embedded pa- tient data not only save storage embedding and the effectiveness of locating tampered regions. 1. Introduction As we move into the digital

  1. DataBank: An Economics Based Privacy Preserving System for Distributing Relevant Advertising and Content

    E-Print Network [OSTI]

    Lillibridge, Mark

    DataBank: An Economics Based Privacy Preserving System for Distributing Relevant Advertising, advertising, personalization, search A critical feature of successful new advertising models has been their reliance on knowledge of various types of personal user data in order to make advertisements relevant

  2. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire

    E-Print Network [OSTI]

    Xu, Wenyuan

    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System companies to collect data ­ "iChange" controls the car via an iPhone ­ More in-car wireless sensor networks. Virtually, all new cars sold or manufactured after 2007 in US are equipped with wireless TPMS. Computer

  3. Privacy-Aware Mechanism Design KOBBI NISSIM, Ben-Gurion University

    E-Print Network [OSTI]

    Fiat, Amos

    Privacy-Aware Mechanism Design KOBBI NISSIM, Ben-Gurion University CLAUDIO ORLANDI, Bar-Ilan University RANN SMORODINSKY, Technion Mechanism design deals with distributed algorithms that are executed are not necessarily in alignment with the objective of the mechanism. Traditionally, mechanisms are designed

  4. A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid

    E-Print Network [OSTI]

    Fang, Yuguang "Michael"

    1 A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid Yanmin Gong to both grid operators and customers, exploiting the full potential of demand response. However to be attributable to individuals. However, this assumption does not hold in incentive-based demand response (IDR

  5. PRIVACY NOTICE At The Maksin Group, we value the trust our customers have placed in us.

    E-Print Network [OSTI]

    Wenderholm, Elaine

    personal information. ACCESS TO YOUR PERSONAL INFORMATION You have a right to request a copy of personal information. You have a right to have us amend your health information for as long as we maintain such information. You have a right to obtain a paper copy of this Privacy Notice. For any of the above requests

  6. A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece

    E-Print Network [OSTI]

    Ioannidis, Sotiris

    A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece Eleni Gessiou of AMKA in Greece in the future, along the lines of the Social Security Number in the US. 1. INTRODUCTION that is made publicly available (e.g., on the face of student ID cards at Universities [5]). Greece recently

  7. GEMSS: Privacy and security for a Medical Grid Jean A.M. Herveg1

    E-Print Network [OSTI]

    Middleton, Stuart E.

    GEMSS: Privacy and security for a Medical Grid Jean A.M. Herveg1 , Federico Crazzolara2 , Stuart E the GEMSS Grid middleware. The security technology employed is based on a public key infrastructure (PKI providers are sufficiently secure. 2. Keywords Grid, Legal, Medical, Personal Data, Security 3. Introduction

  8. Privacy and Contextual Integrity: Framework and Applications Adam Barth Anupam Datta John C. Mitchell

    E-Print Network [OSTI]

    Mitchell, John C.

    Privacy and Contextual Integrity: Framework and Applications Adam Barth Anupam Datta John C helen.nissenbaum@nyu.edu Abstract Contextual integrity is a conceptual framework for un- derstanding for expressing and reasoning about norms of transmission of personal information. In comparison with access

  9. July 1, 2006 -OHSU Ancillaries (Indirect Providers1 & Revisions to Oregon's Genetic Privacy Law

    E-Print Network [OSTI]

    Chapman, Michael S.

    July 1, 2006 - OHSU Ancillaries (Indirect Providers1 ) & Revisions to Oregon's Genetic Privacy Law Reports. OHSU Ancillaries (Indirect Providers) Who Receive Specimens or Health Information from non encryption that is kept separately from the specimen or information. Last Updated 6/27/2006 http://ozone.ohsu.edu/cc/gen/ancillary

  10. AndroidLeaks: Automatically Detecting Potential Privacy Leaks In Android Applications

    E-Print Network [OSTI]

    Chen, Hao

    AndroidLeaks: Automatically Detecting Potential Privacy Leaks In Android Applications on a Large of sensitive information, they may leak it carelessly or maliciously. Google's Android operating systemLeaks, a static analysis framework for automatically finding poten- tial leaks of sensitive information in Android

  11. Toward Standardization in Privacy-Preserving Data Mining Stanley R. M. Oliveira1,2

    E-Print Network [OSTI]

    Zaiane, Osmar R.

    Toward Standardization in Privacy-Preserving Data Mining Stanley R. M. Oliveira1,2 and Osmar R. Zaïane1 {oliveira | zaiane}@cs.ualberta.ca 1 Department of Computing Science University of Alberta techniques, the new generation in PPDM moves on toward standardization because it will certainly play

  12. Security and Privacy for Partial Order Time Sean W. Smith J.D. Tygar

    E-Print Network [OSTI]

    Tygar, Doug

    and privacy risks. Se- cure partial order clocks provide a general method to develop application protocols time service simpli es and clari es the This research was sponsored in part by the Advanced Re- search Projects Agency under contract number F19628-93-C- 0193, IBM, Motorola, the National Science Foundation

  13. Tax Policy Litmus Tests: Enforceability, Privacy, and Efficiency Jon M. Peha1

    E-Print Network [OSTI]

    Peha, Jon M.

    Tax Policy Litmus Tests: Enforceability, Privacy, and Efficiency Jon M. Peha1 Professor of electrical engineering & public policy, Carnegie Mellon University, and Independent Consultant Testimony and public policy at Carnegie Mellon University, and an independent consultant, but today I am representing

  14. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 EPPDR: An Efficient Privacy-Preserving

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    response can maintain supply-demand balance and reduce users' electricity bills. Furthermore, it is also indicates that EPPDR can achieve privacy-preservation of electricity demand, forward secrecy of users of electricity [2]. One appealing feature of smart grid is demand response (DR), which can assist users to use

  15. Challenges in Retaining Privacy in Smart Spaces Jimmy C. Chau and T.D.C. Little

    E-Print Network [OSTI]

    Little, Thomas

    individuals in an office building in which the infrastructure ("smart spaces") provides services to identifyChallenges in Retaining Privacy in Smart Spaces Jimmy C. Chau and T.D.C. Little Department, ubiquitous networking, and other in- door automation infrastructure enable buildings to operate more

  16. Detecting Social Cliques for Automated Privacy Control in Online Social Networks

    E-Print Network [OSTI]

    Kruegel, Christopher

    introduced privacy mechanisms (such as Facebook's friend lists) that enable users to expose a particular of sensitive data is exposed only to the members of a particular clique. Our evaluation on the Facebook typically cover a large fraction of the actual social cliques. I. INTRODUCTION Over the past few years

  17. Sherlock Holmes's Evil Twin: On The Impact of Global Inference for Online Privacy

    E-Print Network [OSTI]

    Sommer, Robin

    --can live on forever [10]. No wonder that the new generation of "social web services," such as Facebook]. Facebook's introduction of "Places" likewise drew significant criticism for its default settings, which]. It can be hard to separate hype from actual risk in such discus- sions. Still, online privacy research

  18. Facebook or Fakebook?: The effect of simulation on location privacy user studies

    E-Print Network [OSTI]

    Henderson, Tristan

    Facebook or Fakebook?: The effect of simulation on location privacy user studies Iain Parris, Fehmi users' actual pri- vacy behaviours and their responses to survey questions [1]. In an attempt to reduce-sharing behaviour in the online social network Facebook, we recruited 40 undergraduate students (17 male, 23 female

  19. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 11 Patient Privacy Policies Effective: April 2003

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 11 Patient Privacy Policies Effective: April 2003 Section 11.2 Uses and Disclosures of Protected Health Information Revised: March 2013 OR ADMINISTRATIVE PROCEEDINGS Policy The Health Science Center may disclose protected health information without

  20. Women as Stakeholders: A Gendered Analysis of the American Recovery and Reinvestment Act in New York City

    E-Print Network [OSTI]

    James, Heather

    2010-01-01

    and Reducing Poverty in New York City. New York: CommissionIt is important that New York City and other localitiesReinvestment Act in New York City Approximately 8,400,000

  1. Resources for Local Policymakers

    SciTech Connect (OSTI)

    SEE Action

    2012-06-01

    Provides a summary of State and Local Energy Efficiency Action Network (SEE Action) information resources available to local policymakers, organized by topic.

  2. an Recovery and Reinvestment Act of 20091 (Recovery Act) provides protections for cert

    E-Print Network [OSTI]

    Tam, Tin-Yau

    ors, subcontractors, grantees, or professional membership organizations acting in the interest ry Act vernmen ctors, sububbbbbcoonttraactctorors,s,s,s,s grantees, or proofofofofofesesesessisisis

  3. Clean Air Act Amendments of 1990 

    E-Print Network [OSTI]

    Hanneschlager, R. E.

    1990-01-01

    Congress is currently debating amendments to the Clean Air Act which would strengthen and enhance the current Clean Air Act. The bill would guarantee a reduction of 10 million tons of sulfur dioxide from 1980 levels; would sharply reduce pollutants...

  4. District of Columbia Recovery Act State Memo

    Broader source: Energy.gov [DOE]

    The American Recovery & Reinvestment Act (ARRA) is making a meaningful down payment on the nation’s energy and environmental future. The Recovery Act investments in the District of Columbia...

  5. Investigating User Privacy in Android Ad Libraries Ryan Stevens, Clint Gibler, Jon Crussell, Jeremy Erickson and Hao Chen

    E-Print Network [OSTI]

    Chen, Hao

    Erickson and Hao Chen University of California, Davis {rcstevens, cdgibler, jcrussell, jericks, chen information the app collects [39] and a more general "Consumer Privacy Bill of Rights" that is supposed

  6. Williamson Act | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEtGeorgia: EnergyMaryland:MeadowWikiSysop'sOhio:Florida: EnergyAct Jump to:

  7. Recovery Act State Memos Nevada

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo. 195 - Oct. 7,DOERTI | Department8Recovery ActCalifornia ForNevada

  8. Sikes Act | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS ReportEurope GmbH Jump to: navigation,ShowSikes Act Jump to:

  9. Recovery Act | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report Appendices |ProjectKnow YourDepartment ofAugustPastRecovery Act

  10. Energy Employees' Occupational Illness Compensation Program Act...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Employees' Occupational Illness Compensation Program Act (EEOICPA) Tracking Database, INL Energy Employees' Occupational Illness Compensation Program Energy Employees' Occupational...

  11. Local regulation of immigration

    E-Print Network [OSTI]

    Appleby, Clare A.

    2009-01-01

    2006. The Citizen and the Alien. Princeton, NJ: PrincetonPennsylvania. 2006. “Illegal Alien Immigration Relief Act. ”2001. “The Evolution of Alien Rights in the United States,

  12. Stability of local quantum dissipative systems

    E-Print Network [OSTI]

    Cubitt, Toby S.; Lucia, Angelo; Michalakis, Spyridon; Perez-Garcia, David

    2015-04-07

    in the engineered Liouvillian itself. Once again, stability against local perturbations – this time for many-body Liouvillians rather than Hamiltonians – is of crucial importance. Indeed, in [53] the authors consider depolarizing noise acting on top of a dissipative... the canonical basis for Hx. Scalar product in Hx will be denoted by ??|??, and rank-one linear maps by |????|. For each finite subset ? ? ? , the associated Hilbert space is given by H? = ? x?? Hx, (1) and the algebra of observables supported on ? is defined...

  13. Copyright 2014 -Copyright Information, Privacy Statement, and Terms of Use American Society of Agronomy | Crop Science Society of America | Soil Science Society of America

    E-Print Network [OSTI]

    Sparks, Donald L.

    © Copyright 2014 - Copyright Information, Privacy Statement, and Terms of Use American Society of Agronomy | Crop Science Society of America | Soil Science Society of America 5585 Guilford Road | Madison

  14. Protecting Privacy Against Location-based Personal Identification

    E-Print Network [OSTI]

    Wang, Xiaoyang "Sean"

    machines, ...), services that provide localized news (e.g., weather forecasts, road constructions, etc to personally identify the house's owner since the mapping of such coordinates to home addresses is generally available and a simple look up in a phone book (or similar sources) can reveal the people who live there

  15. Recovery Act Federal Register Notices | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a grant from the Department of Energy's Smart Grid Investment Grant (SGIG) Program. More Congressional Testimony Recovery Act Recovery Act Interoperability Recovery Act SGIG...

  16. Connecticut Recovery Act State Memo | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Connecticut Recovery Act State Memo Connecticut Recovery Act State Memo The American Recovery & Reinvestment Act (ARRA) is making a meaningful downpayment on the nation's energy...

  17. Localization of quantum Bernoulli noises

    SciTech Connect (OSTI)

    Wang, Caishi; Zhang, Jihong [School of Mathematics and Statistics, Northwest Normal University, Lanzhou, Gansu 730070 (China)] [School of Mathematics and Statistics, Northwest Normal University, Lanzhou, Gansu 730070 (China)

    2013-10-15

    The family (?{sub k},?{sub k}{sup *}){sub k?0} of annihilation and creation operators acting on square integrable functionals of a Bernoulli process Z= (Z{sub k}){sub k?0} can be interpreted as quantum Bernoulli noises. In this note we consider the operator family (?{sub k},?{sub k}{sup *}){sub k?0}, where ?{sub k}=?{sub k}E{sub k} with E{sub k} being the conditional expectation (operator) given ?-field ?(Z{sub j}; 0 ?j?k). We show that ?{sub k} (resp. ?{sub k}{sup *}) is essentially a kind of localization of the annihilation operator ?{sub k} (resp. creation operator ?{sub k}{sup *}). We examine properties of the family (?{sub k},?{sub k}{sup *}){sub k?0} and prove, among other things, that ?{sub k} and ?{sub k}{sup *} satisfy a local canonical anti-communication relation and (?{sub k}{sup *}){sub k?0} forms a mutually orthogonal operator sequence although each ?{sub k} is not a projection operator. We find that the operator series ?{sub k=0}{sup ?}?{sub k}{sup *}X?{sub k} converges in the strong operator topology for each bounded operator X acting on square integrable functionals of Z. In particular we get an explicit sum of the operator series ?{sub k=0}{sup ?}?{sub k}{sup *}?{sub k}. A useful norm estimate on ?{sub k=0}{sup ?}?{sub k}{sup *}X?{sub k} is also obtained. Finally we show applications of our main results to quantum dynamical semigroups and quantum probability.

  18. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity

    E-Print Network [OSTI]

    Blundo, Carlo; Gasti, Paolo

    2011-01-01

    This paper presents the first practical construction for privacy-preserving evaluation of sample set similarity, based on the well-known Jaccard index measure. In this problem, two mutually distrustful entities determine how similar their sets are, without disclosing their content to each other. We propose two efficient protocols: the first securely computes the Jaccard index of two sets; the second approximates it using MinHash techniques, at a significantly lower cost and with same privacy guarantees. This building block is attractive in many relevant applications, including document similarity, biometric authentication, multimedia file retrieval, and genetic tests. We demonstrate, both analytically and experimentally, that our constructions -- while not bounded to any specific application -- are appreciably more efficient than prior specialized techniques.

  19. Massachusetts Endangered Species Act Regulations (Massachusetts)

    Broader source: Energy.gov [DOE]

    The regulations that accompany the Massachusetts Endangered Species Act list three categories of animals and plants in need of protection: endangered, threatened, and species of special concern....

  20. Integrated Solid Waste Management Act (Nebraska)

    Broader source: Energy.gov [DOE]

    This act affirms the state's support for alternative waste management practices, including waste reduction and resource recovery. Each county and municipality is required to file an integrated...

  1. with Disabilities Act Requirements Workplace ADA Requirements...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Americans with Disabilities Act (ADA) is a federal civil rights law that prohibits discrimination in public places against individuals with disabilities. As an employer installing...

  2. Remarks from the Acting Deputy Secretary

    Office of Energy Efficiency and Renewable Energy (EERE)

    Remarks as prepared for delivery by Acting Deputy Secretary of Energy Jeffrey Kupfer; State of Environmental Justice in America; May 22, 2008; Washington, DC.

  3. Recovery Act Progress Update: Reactor Closure Feature

    SciTech Connect (OSTI)

    Cody, Tom

    2010-01-01

    A Recovery Act Progress Update. Decommissioning of two nuclear reactor sites at the Department of Energy's facilities has been approved and is underway.

  4. Faces of the Recovery Act: 1366 Technologies

    Broader source: Energy.gov [DOE]

    LEXINGTON, MA - At 1366 Technologies, Ely Sachs and Frank van Mierlo are using ARPA-E Recovery Act funding to dramatically reduce the costs of solar panel production.

  5. TAP Webinar: Davis-Bacon Act Compliance

    Office of Energy Efficiency and Renewable Energy (EERE)

    This webinar, held on Nov. 18, 2014, offered information for Energy Department grantees, sub-grantees, and their contractors on complying with Davis-Bacon Act requirements.

  6. Faces of the Recovery Act: Sun Catalytix

    Broader source: Energy.gov [DOE]

    At the Massachusetts Institute of Technology, Dan Nocera talks about Sun Catalytix, the next generation of solar energy, and ARPA-E funding through the Recovery Act.

  7. National Environmental Policy Act: Little Information Exists...

    Open Energy Info (EERE)

    National Environmental Policy Act: Little Information Exists on NEPA Analyses Jump to: navigation, search OpenEI Reference LibraryAdd to library Report: National Environmental...

  8. Recovery Act Progress Update: Reactor Closure Feature

    ScienceCinema (OSTI)

    Cody, Tom

    2012-06-14

    A Recovery Act Progress Update. Decommissioning of two nuclear reactor sites at the Department of Energy's facilities has been approved and is underway.

  9. Aligning National Environmental Policy Act Process with Environmental...

    Energy Savers [EERE]

    Aligning National Environmental Policy Act Process with Environmental Management Systems Aligning National Environmental Policy Act Process with Environmental Management Systems...

  10. Privacy of Your Health Information This notice describes how medical information about you may be used and disclosed and how you

    E-Print Network [OSTI]

    Acton, Scott

    1 Privacy of Your Health Information This notice describes how medical information about you may be used and disclosed and how you can get access to this information. Please review it carefully") is committed to protecting the privacy of your protected health information. Protected health information

  11. ACT Basic Training 05/08/2009ACT Basic Training 05/08/2009ACT Basic Training 05/08/2009ACT Basic Training 05/08/2009 OFFICIAL ANNOUNCEMENT & REGISTRATION INFORMATION

    E-Print Network [OSTI]

    Zhou, Yaoqi

    ACT Basic Training 05/08/2009ACT Basic Training 05/08/2009ACT Basic Training 05/08/2009ACT Basic Training 05/08/2009 OFFICIAL ANNOUNCEMENT & REGISTRATION INFORMATION ACT Basic Training ­ May 8, 2009 PURPOSE: The ACT Basic Training is designed to help staff who are new to Assertive Community Treatment

  12. NATURAL RESOURCES AND ENVIRONMENTAL PROTECTION ACT (EXCERPT) Act 451 of 1994

    E-Print Network [OSTI]

    NATURAL RESOURCES AND ENVIRONMENTAL PROTECTION ACT (EXCERPT) Act 451 of 1994 PART 85 FERTILIZERS in the same order given in this subdivision. Indication of grade does not apply to peat or peat moss or soil

  13. Overview of the State and Local Energy Efficiency Action Network

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Working Group plans for this year * New guidance documents were published - Energy Efficiency Program Impact Evaluation Guide - Guide for Regulators on Data Access and Privacy -...

  14. National Construction Safety Team Act Annual Report

    E-Print Network [OSTI]

    Magee, Joseph W.

    National Construction Safety Team Act Annual Report Fiscal Year 2007 Introduction In October 2002, the President signed into law the National Construction Safety Team (NCST) Act (P.L. 107 National Construction Safety Teams for deployment after events causing the failure of a building

  15. Faces of the Recovery Act: Sun Catalytix

    ScienceCinema (OSTI)

    Nocera, Dave

    2013-05-29

    BOSTON- At the Massachusetts Institute of Technology, Dan Nocera talks about Sun Catalytix, the next generation of solar energy, and ARPA-E funding through the Recovery Act. To learn about more ARPA-E projects through the Recovery Act: http://arpa-e.energy.gov/FundedProjects.aspx

  16. Policy on Foreign Corrupt Practices Act

    E-Print Network [OSTI]

    Sridhar, Srinivas

    Policy on Foreign Corrupt Practices Act I. Purpose and Scope The university has developed this policy to comply with requirements of the federal Foreign Corrupt Practices Act. The policy applies to university activities throughout the world. II. Definitions For purposes of this Policy, Anything of Value

  17. Clean Air Act Requirements: Uranium Mill Tailings

    E-Print Network [OSTI]

    EPA'S Clean Air Act Requirements: Uranium Mill Tailings Radon Emissions Rulemaking Reid J. Rosnick Requirements for Uranium Operations (Clean Air Act) Subpart W Requirements (continued) · Radon emission standard of 20 pCi/m2/sec -- annual reporting requirements, notification in advance of testing · The radon

  18. 73-20-1. Short title. This act may be cited as the "Watershed District Act".

    E-Print Network [OSTI]

    Johnson, Eric E.

    District Act [73-20-1 NMSA 1978] is to secure the federal assistance provided in Public Law 566 of the 83rd73-20-1. Short title. This act may be cited as the "Watershed District Act". History: 1953 Comp., § 45-5-19, enacted by Laws 1957, ch. 210, § 1. Cross references. -- For provisions of the Water Project

  19. The Culture of Surveillance Revisited: Total Information Awareness and the New Privacy Landscape

    E-Print Network [OSTI]

    Staples, William G.

    2005-04-01

    the likes of Jeff Bezos that a jack boot on the neck will raise the hackles of the public, but offer them great prices and free shipping and people will gladly hand over their “personal information.” Or as neo-liberal Nikolas Rose puts it, “To govern humans...-192 in Computers, Surveillance, and Privacy edited by David Lyon and Elia Zureik. Minneapolis: University of Minne- sota Press. Rose, Nikolas. 1999. Powers of Freedom: Reframing Political Thought. Cambridge, UK: Cambridge University Press. Shachtman, Noah. 2003...

  20. Privacy Impact Assessment | OSTI, US Dept of Energy, Office of Scientific

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . .Privacy

  1. Optimizing local protocols implementing nonlocal quantum gates

    E-Print Network [OSTI]

    Scott M. Cohen

    2010-02-02

    We present a method of optimizing recently designed protocols for implementing an arbitrary nonlocal unitary gate acting on a bipartite system. These protocols use only local operations and classical communication with the assistance of entanglement, and are deterministic while also being "one-shot", in that they use only one copy of an entangled resource state. The optimization is in the sense of minimizing the amount of entanglement used, and it is often the case that less entanglement is needed than with an alternative protocol using two-way teleportation.

  2. Local Regression and Likelihood

    E-Print Network [OSTI]

    Masci, Frank

    Local Regression and Likelihood Clive Loader Springer #12;#12;#12;#12;#12;Preface This book, and the associated software, have grown out of the author's work in the field of local regression over the past- ods and in particular regression, for example at the level of Draper and Smith (1981). The theoretical

  3. Georgia Air Quality Control Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Georgia Air Quality Control Act (AQCA) is a set of environmental regulations, permitting requirements, and air quality standards that control the amount of pollutants emitted and who emits them...

  4. Clean Air Act of Montana (Montana)

    Broader source: Energy.gov [DOE]

    The purpose of the Clean Air Act of Montana is to achieve and maintain levels of air quality to "protect human health and safety and, to the greatest degree practicable, prevent injury to plant and...

  5. Carbon Dioxide Transportation and Sequestration Act (Illinois)

    Broader source: Energy.gov [DOE]

    This Act applies to the application process for the issuance of a certificate of authority by an owner or operator of a pipeline designed, constructed, and operated to transport and to sequester...

  6. Gaines County Solid Waste Management Act (Texas)

    Broader source: Energy.gov [DOE]

    This Act establishes the Gaines County Solid Waste Management District, a governmental body to develop and carry out a regional water quality protection program through solid waste management and...

  7. Massachusetts Hazardous Waste Management Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act contains regulations for safe disposal of hazardous waste, and establishes that a valid license is required to collect, transport, store, treat, use, or dispose of hazardous waste. Short...

  8. Federal Buildings Personnel Training Act of 2010

    Broader source: Energy.gov [DOE]

    On December 14, 2010, President Obama signed the Federal Buildings Personnel Training Act of 2010 into law. This legislation will have an important impact on Federal agency training programs geared...

  9. RECOVERY ACT: TAPOCO PROJECT: CHEOAH UPGRADE

    SciTech Connect (OSTI)

    Tran, Paul

    2013-02-28

    Under Funding Opportunity Announcement Number: DE-FOA-0000120, Recovery Act: Hydroelectric Facility Modernization, Alcoa Power Generating Inc. (APGI), a fully owned subsidiary of Alcoa Inc., implemented major upgrades at its Cheoah hydroelectric facility near Robbinsville, North Carolina.

  10. The Economic Recovery Tax Act of 1981. 

    E-Print Network [OSTI]

    Pena, Jose G.; Lovell, Ashley C.; Kensing, Robert H.

    1983-01-01

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Considerations for Estate Planning under ERTA ............................................... 8 2 The Economic Recovery Tax Act of 1981 Jose G. Pena, Ashley C. Lovell and Robert H. Kensing* Major changes in the gift and estate tax laws were...

  11. The National Energy Act of 1978

    SciTech Connect (OSTI)

    Richardson, J.; Nordhaus, R. [Van Ness Feldman, P.C., Washington, DC (United States)

    1995-12-31

    This article describes the National Energy Act of 1978, its major provisions, the historical context in which it was developed and passed, and the historical prospective its provisions have now.

  12. DOE National Environmental Policy Act Implementing Procedures...

    Broader source: Energy.gov (indexed) [DOE]

    PART 1021 - NATIONAL ENVIRONMENTAL POLICY ACT IMPLEMENTING PROCEDURES DEPARTMENT OF ENERGY Authority: 42 U.S.C. 7101 et seq.; 42 U.S.C. 4321 et seq.; 50 U.S.C. 2401 et seq. Subpart...

  13. Act One: NPCP (2013-CE-49001)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that Act One Communications, Inc. failed to certify a variety of traffic signal modules and pedestrian modules as compliant with the applicable energy conservation standards.

  14. Flathead Basin Commission Act of 1983 (Montana)

    Broader source: Energy.gov [DOE]

    This Act establishes the Flathead Basin Commission, the purpose of which is to protect the Flathead Lake aquatic environment, its waters, and surrounding lands and natural resources. The Commission...

  15. Remarks by the Acting Secretary of Energy

    Broader source: Energy.gov [DOE]

    Remarks by Acting Secretary Daniel B. Poneman concerning the importance of integrated safety management for the protection of workers, the public, and the environment and successfully implementing the Department's missions.

  16. Faces of the Recovery Act: 1366 Technologies

    SciTech Connect (OSTI)

    Sachs, Ely; Mierlo, Frank van; Obama, Barack

    2010-01-01

    LEXINGTON, MA - At 1366 Technologies, Ely Sachs and Frank van Mierlo are using ARPA-E Recovery Act funding to dramatically reduce the costs of solar panel production. To read more about the project: http://arpa-e.energy.gov/FundedProjects.aspx#1366 To see more projects funded by the Recovery Act through ARPA-E: http://arpa-e.energy.gov/FundedProjects.aspx

  17. Faces of the Recovery Act: 1366 Technologies

    ScienceCinema (OSTI)

    Sachs, Ely; Mierlo, Frank van; Obama, Barack

    2013-05-29

    LEXINGTON, MA - At 1366 Technologies, Ely Sachs and Frank van Mierlo are using ARPA-E Recovery Act funding to dramatically reduce the costs of solar panel production. To read more about the project: http://arpa-e.energy.gov/FundedProjects.aspx#1366 To see more projects funded by the Recovery Act through ARPA-E: http://arpa-e.energy.gov/FundedProjects.aspx

  18. Recovery Act Reports | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data CenterFinancialInvesting inServicesRecovery Act » Recovery Act Reports

  19. State of Georgia CERTIFICATE OF EXEMPTION OF LOCAL HOTEL/MOTEL EXCISE TAX

    E-Print Network [OSTI]

    Teskey, Robert O.

    AND MOTEL OPERATORS: Effective April 2, 1987, Act Number 621 amending Official Code of Georgia Annotated for exemption of the local hotel/motel excise tax under Official Code of Georgia Annotated Chapter 48-13 (as Section 48-13-51 provides that Georgia state or local government officials or employees traveling

  20. Geography of local configurations

    E-Print Network [OSTI]

    David Coupier

    2010-10-12

    A $d$-dimensional binary Markov random field on a lattice torus is considered. As the size $n$ of the lattice tends to infinity, potentials $a=a(n)$ and $b=b(n)$ depend on $n$. Precise bounds for the probability for local configurations to occur in a large ball are given. Under some conditions bearing on $a(n)$ and $b(n)$, the distance between copies of different local configurations is estimated according to their weights. Finally, a sufficient condition ensuring that a given local configuration occurs everywhere in the lattice is suggested.

  1. PRIVACY AND CONFIDENTIALITY OF PATIENT INFORMATION The University of Connecticut School of Medicine (UConn SOM) and affiliated sites establish

    E-Print Network [OSTI]

    Page 148 ` PRIVACY AND CONFIDENTIALITY OF PATIENT INFORMATION The University of Connecticut School patient information that is protected from disclosure by both Connecticut and federal laws in all respects with both Connecticut and federal laws, such as HIPAA. For the UConn Health's full policy

  2. Location Privacy with Road network Mix-zones Balaji Palanisamy, Ling Liu, Kisung Lee, Aameek Singh and Yuzhe Tang

    E-Print Network [OSTI]

    Liu, Ling

    Location Privacy with Road network Mix-zones Balaji Palanisamy, Ling Liu, Kisung Lee, Aameek Singh attacks that make mix-zones on road networks vulnerable and illustrate a set of counter measures to make road network mix-zones attack resilient. Concretely, we categorize the vulnerabilities of road network

  3. The Jones Act : an economic and political evaluation

    E-Print Network [OSTI]

    Smith, Richard A. (Richard Allen), 1981-

    2004-01-01

    On June 5, 1920, the Merchant Marine Act of 1920, also known as the Jones Act, became law. The Jones Act, a cabotage law, restricts American waterborne domestic trade to vessels flagged in the United States, owned by ...

  4. Statement of Patricia Hoffman Acting Assistant Secretary for...

    Energy Savers [EERE]

    U.S. House of Representatives, July 23, 2009. The Energy Independence and Security Act of 2007 (EISA) and the American Recovery and Reinvestment Act of 2009 (Recovery Act)...

  5. Power Plant and Industrial Fuel Use Act | Department of Energy

    Office of Environmental Management (EM)

    Power Plant and Industrial Fuel Use Act Power Plant and Industrial Fuel Use Act Self Certifications Title II of the Powerplant and Industrial Fuel Use Act of 1978 (FUA), as amended...

  6. Local Public Finance

    E-Print Network [OSTI]

    Quigley, John M.

    2008-01-01

    1959. The Theory of Public Finance. New York: McGraw-Hill.T. 2003. School finance, spatial income segregation, and theJohn M. "local public finance." The New Palgrave Dictionary

  7. California Recovery Act State Memo | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Act State Memo California Recovery Act State Memo California has substantial natural resources, including oil, gas, solar, wind, geothermal, and hydroelectric power. The...

  8. Acting Department of Energy Deputy Secretary of Energy Jeffrey...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Acting Department of Energy Deputy Secretary of Energy Jeffrey Kupfer to Lead U.S. Delegation to Istanbul, Turkey and World Economic Forum Acting Department of Energy Deputy...

  9. American Recovery and Reinvestment Act of 2009: Biomass Program Investments

    SciTech Connect (OSTI)

    2012-06-01

    This fact sheet discusses the Biomass Program's investments using Recovery Act funding, as well as make note of how Recovery Act projects are currently doing.

  10. Template for Expedited National Environmental Policy Act (NEPA...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Environmental Policy Act (NEPA) Review of Certain State Energy Program Projects Template for Expedited National Environmental Policy Act (NEPA) Review of Certain State...

  11. Clean Air Act General Conformity Requirements and the National...

    Broader source: Energy.gov (indexed) [DOE]

    related references. Clean Air Act General Conformity Requirements and the National Environmental Policy Act Process More Documents & Publications EIS-0470: Cape Wind Energy...

  12. Questions and Answers about National Environmental Policy Act...

    Office of Environmental Management (EM)

    Questions and Answers about National Environmental Policy Act (NEPA) Compliance Questions and Answers about National Environmental Policy Act (NEPA) Compliance Questions and...

  13. GAO Report -- National Environmental Policy Act: Little Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GAO Report -- National Environmental Policy Act: Little Information Exists on NEPA Analyses GAO Report -- National Environmental Policy Act: Little Information Exists on NEPA...

  14. DOE Secretarial Notice: National Environmental Policy Act (February...

    Office of Environmental Management (EM)

    Notice: National Environmental Policy Act (February 5, 1990, status: cancelled) DOE Secretarial Notice: National Environmental Policy Act (February 5, 1990, status: cancelled) This...

  15. Recovery Act Selections for Smart Grid Invesment Grant Awards...

    Energy Savers [EERE]

    Recovery Act Selections for Smart Grid Invesment Grant Awards- By Category Updated July 2010 Recovery Act Selections for Smart Grid Invesment Grant Awards- By Category Updated July...

  16. Recovery Act Selections for Smart Grid Investment Grant Awards...

    Energy Savers [EERE]

    Recovery Act Selections for Smart Grid Investment Grant Awards- By Category Updated July 2010 Recovery Act Selections for Smart Grid Investment Grant Awards- By Category Updated...

  17. Climate Change, the Clean Air Act, and Industrial Pollution

    E-Print Network [OSTI]

    Kaswan, Alice

    2012-01-01

    Air Act, and Industrial Pollution Professor Alice Kaswan* I.a. Existing Air Pollution. . b. Do Climate Policieson Cli- mate Change, Pollution, and the Clean Air Act." I

  18. National Energy Policy Act Guide for State Energy Program and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Energy Policy Act Guide for State Energy Program and Energy Efficiency and Conservation Block Grant Projects National Energy Policy Act Guide for State Energy Program and...

  19. Public Utility Regulatory Policies Act of 1978 (PURPA) as Applicable...

    Energy Savers [EERE]

    List of Covered Electric Utilities. Public Utility Regulatory Policies Act of 1978 (PURPA) as Applicable to the Energy Policy Act of 2005 (EPACT 2005) - List of Covered Electric...

  20. National Environmental Policy Act (NEPA) | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Environmental Management System National Environmental Policy Act (NEPA) National Environmental Policy Act (NEPA) Regulations and Links DOE NEPA Website NEPA Compliance Program...

  1. qryFairAct2000 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    qryFairAct2000&0; More Documents & Publications rptDOEFairAct2000.PDF&0; OMBDOEFAIR2005.xls&0; 3REV2004DOEFAIR.xls&0;...

  2. Environmental Quality Improvement Act of 1970 | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental Quality Improvement Act of 1970 Environmental Quality Improvement Act of 1970 The Congress declares that there is a national policy for the environment which provides...

  3. Microsoft Word - Attachment 3 Recovery Act notification | Department...

    Energy Savers [EERE]

    Microsoft Word - Attachment 3 Recovery Act notification Microsoft Word - Attachment 3 Recovery Act notification More Documents & Publications Microsoft Word - Attachment 3 Recovery...

  4. POLICY GUIDANCE MEMORANDUM #08 DOE Fair Labor Standards Act ...

    Office of Environmental Management (EM)

    8 DOE Fair Labor Standards Act (FLSA) ExemptNon-Exempt Status Determination POLICY GUIDANCE MEMORANDUM 08 DOE Fair Labor Standards Act (FLSA) ExemptNon-Exempt Status...

  5. National Environmental Policy Act (NEPA) | Department of Energy

    Office of Environmental Management (EM)

    National Environmental Policy Act (NEPA) National Environmental Policy Act (NEPA) All Electricity Delivery and Energy Reliability (OE) projects are reviewed under the National...

  6. Toxic Substances Control Act Uranium Enrichment Federal Facility...

    Office of Environmental Management (EM)

    Toxic Substances Control Act Uranium Enrichment Federal Facility Compliance Agreement Toxic Substances Control Act Uranium Enrichment Federal Facility Compliance Agreement Toxic...

  7. President Obama Announces Over $467 Million in Recovery Act Funding...

    Energy Savers [EERE]

    President Obama Announces Over 467 Million in Recovery Act Funding for Geothermal and Solar Energy Projects President Obama Announces Over 467 Million in Recovery Act Funding for...

  8. President Obama Announces Over $467 Million in Recovery Act Funding...

    Energy Savers [EERE]

    Over 467 Million in Recovery Act Funding for Geothermal and Solar Energy Projects President Obama Announces Over 467 Million in Recovery Act Funding for Geothermal and Solar...

  9. Study Shows Significant Economic Impact from Recovery Act | Department...

    Office of Environmental Management (EM)

    Study Shows Significant Economic Impact from Recovery Act Study Shows Significant Economic Impact from Recovery Act A study recently released shows the 1.6 billion the Savannah...

  10. Recovery Act: Clean Coal Power Initiative | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    A report detailling the Clean Coal Power initiative funded under the American Recovery and Renewal Act of 2009. Recovery Act: Clean Coal Power Initiative More Documents &...

  11. Local diffusion networks act as pathways?to sustainable agriculture in the Sacramento River Valley

    E-Print Network [OSTI]

    Lubell, Mark; Fulton, Allan

    2007-01-01

    agriculture in the Sacramento River Valley by Mark Lubellquality management in the Sacramento River Valley. Data fromencourage growers in the Sacramento River Valley to

  12. More than $60 Million in Recovery Act Funding to Expand Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    County, California (2,401,309) Eagle County - Eagle County, Colorado (4,916,126) Connecticut Innovations, Inc. - Rocky Hill, Connecticut (4,171,124) St. Lucie County...

  13. More than $60 Million in Recovery Act Funding to Expand Local...

    Office of Environmental Management (EM)

    created or saved under the project, the energy saved, the renewable energy capacity installed, the greenhouse gas emissions reduced, and the funds leveraged. The following...

  14. Kyoto: Think Global, Act Local (K:TGAL) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EAInvervar HydroElectric Cooperative JumpKotakKut Energy PvtCorpKyoto:

  15. American Reinvestment and Recovery Act § 1553: Protecting State and Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p u t y AEfficiencyEnergy 2:00PM EDT tois oneGovernment and

  16. More than $60 Million in Recovery Act Funding to Expand Local Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice| DepartmentGJPPGPracticesDraft.doc Moreof%ofLauren

  17. LANL selects local small business for post-Recovery Act cleanup contract

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask2 J.N.open to badge

  18. In Second International Workshop on Security and Privacy in Cloud Computing, Minneapolis, MN. 24 June 2011. Private Editing Using Untrusted Cloud Services

    E-Print Network [OSTI]

    Evans, David

    In Second International Workshop on Security and Privacy in Cloud Computing, Minneapolis, MN. 24 of Virginia MightBeEvil.com Abstract--We present a general methodology for protecting the confidentiality

  19. Estuary Restoration Act of 2000 Title I of Estuaries and Clean Waters Act of 2000

    E-Print Network [OSTI]

    US Army Corps of Engineers

    information. The U.S. Army Corps of Engineers received project funding totaling $ 3,974,000 for fiscal years of Section 108 of the Estuary Restoration Act, Title I of P.L. 106-457 (Act). This report covers the fiscal Register, Vol. 67, No. 232). Funds were authorized to be appropriated to the Army for fiscal years 2001

  20. Mr. John Kieling, Acting Chief Haza

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMove dataKiel ing , ActingActing Chief

  1. Unconventional Pollution Control Politics: The Reformation of the US Safe Drinking Water Act

    E-Print Network [OSTI]

    Zarkin, Michael

    2015-01-01

    like the Clean Air Act and Clean Water Act were likewiselike the Clean Air Act and Clean Water Act that directlylike the Clean Air Act and the Clean Water Act, the SDWA

  2. Local STAR Libraries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCenter (LMI-EFRC) ProximityCenterLeeincreasesLocal HighLocal

  3. ARTIFICIAL INTELLIGENCE Learning to see and act

    E-Print Network [OSTI]

    Meeden, Lisa A.

    ARTIFICIAL INTELLIGENCE Learning to see and act An artificial-intelligence system uses machine to process large amounts of data have led to progress in many areas of science, not least artificial intelligence (AI). With advances in machine learning has come the development of machines that can learn

  4. TAP Webinar: Davis-Bacon Act Compliance

    Broader source: Energy.gov [DOE]

    This TAP webinar held on Nov. 18, 2014 from 1:00 p.m. - 3:00 p.m. Eastern Standard Time. It will offer information for Energy Department grantees, sub-grantees, and their contractors on complying with Davis-Bacon Act requirements.

  5. National Environmental Policy Act Compliance Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-10-26

    The purpose of this Order is to establish DOE internal requirements and responsibilities for implementing the National Environmental Policy Act of 1969 (NEPA), the Council on Environmental Quality Regulations Implementing the Procedural Provisions of NEPA (40 CFR Parts 1500-1508), and the DOE NEPA Implementing Procedures (10 CFR Part 1021). Change 1 has been added to this Order 9/28/2001.

  6. Recovery Act Weekly Video: 200 West Drilling

    ScienceCinema (OSTI)

    None

    2012-06-14

    President of Cascade Drilling, Bruce, talks about his contract with the Department of Energy and what his team is doing to improve water treatment and environmental cleanup. The small business owner hits on how the Recovery Act saved him from downsizing and helped him stay competitive and safe on site.

  7. Energy Independence and Security Act of 2007

    SciTech Connect (OSTI)

    2011-12-30

    An Act passed in 2007 to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  8. Wetland Conservation The Food Security Act was enacted on

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Wetland Conservation Compliance #12;The Food Security Act was enacted on December 23, 1985. Title. · Developed to streamline wetland delineation process and promote consistency between the Clean Water Act and the Food Security Act. #12;1994 National Food Security Act Manual Procedures · Provided NRCS staff policy

  9. Local Blog Get Listed

    E-Print Network [OSTI]

    Chiao, Jung-Chih

    Home· Local Blog· Get Listed· Popular Listings· More Directories· Advertise Here· Home » Arlington ... | directoryofarlingt... 1/9/2011http://www.directoryofarlington.com/blog/2011/01/ut ... | directoryofarlingt... 1/9/2011http://www.directoryofarlington.com/blog/2011/01/ut

  10. Lithium Local Pseudopotential Using

    E-Print Network [OSTI]

    Petta, Jason

    Lithium Local Pseudopotential Using DFT Sergio Orozco Student Advisor: Chen Huang Faculty Mentor Lithium LPS Test Lithium LPS #12;Density Functional Theory (DFT) Successful quantum mechanical approach (1979) #12;Building LPS for Lithium Create a LPS using NLPS density for Lithium Test LPS by comparing

  11. Supersymmetry and localization

    E-Print Network [OSTI]

    Albert Schwarz; Oleg Zaboronsky

    1995-11-15

    We study conditions under which an odd symmetry of the integrand leads to localization of the corresponding integral over a (super)manifold. We also show that in many cases these conditions guarantee exactness of the stationary phase approximation of such integrals.

  12. LEEDBuilding LocalGovernments

    E-Print Network [OSTI]

    Radcliffe, David

    their jurisdictions' green building programs. #12;1LEED Building Ordinances for Local Governments LEED Building are increasingly common. Most of these ordinances adopt the Leadership in Energy and Environmental Design (LEED) Green Rating System, promulgated by the U.S. Green Building Council (USGBC). The LEED rating system sets

  13. Local microwave background radiation

    E-Print Network [OSTI]

    Domingos Soares

    2014-11-13

    An inquiry on a possible local origin for the Microwave Background Radiation is made. Thermal MBR photons are contained in a system called {\\it magnetic bottle} which is due to Earth magnetic field and solar wind particles, mostly electrons. Observational tests are anticipated.

  14. The Nuclear Waste Policy Act, as amended with appropriations acts appended

    SciTech Connect (OSTI)

    Not Available

    1994-03-01

    The Nuclear Waste Policy Act of 1982 provides for the development of repositories for the disposal of high-level radioactive waste and spent nuclear fuel, to establish a program of research, development and demonstration regarding the disposal of high-level radioactive waste and spent nuclear fuel. Titles 1 and 2 cover these subjects. Also included in this Act are: Title 3: Other provisions relating to radioactive waste; Title 4: Nuclear waste negotiation; Title 5: Nuclear waste technical review board; and Title 6: High-level radioactive waste. An appendix contains excerpts from appropriations acts from fiscal year 1984--1994.

  15. NEW DIRECTIONS IN LOCAL HISTORY

    E-Print Network [OSTI]

    Banaji,. Murad

    NEW DIRECTIONS IN LOCAL HISTORY SINCE HOSKINS Edited by Christopher Dyer, Andrew Hopper, Evelyn Lord and Nigel Tringham New Directions in Local History since Hoskins Local history in Britain can of the publication of his Local History in England which was designed to help people researching the history

  16. Articulations of National Membership on Debates about the DREAM Act and the AgJOBS Act

    E-Print Network [OSTI]

    Ackerman, Astrid

    2013-01-01

    economic, and national security arguments in making the casebecomes a matter of national security in the AgJOBS Act. Bypublic safety and national security. My analysis is based on

  17. MELCOR accident analysis for ARIES-ACT

    SciTech Connect (OSTI)

    Paul W. Humrickhouse; Brad J. Merrill

    2012-08-01

    We model a loss of flow accident (LOFA) in the ARIES-ACT1 tokamak design. ARIES-ACT1 features an advanced SiC blanket with LiPb as coolant and breeder, a helium cooled steel structural ring and tungsten divertors, a thin-walled, helium cooled vacuum vessel, and a room temperature water-cooled shield outside the vacuum vessel. The water heat transfer system is designed to remove heat by natural circulation during a LOFA. The MELCOR model uses time-dependent decay heats for each component determined by 1-D modeling. The MELCOR model shows that, despite periodic boiling of the water coolant, that structures are kept adequately cool by the passive safety system.

  18. Privacy Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPress

  19. Privacy Resources

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeedingProgramExemptions | National Nuclear SecurityRecords | Department

  20. Privacy Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . .

  1. Clean Water Act (excluding Section 404)

    SciTech Connect (OSTI)

    Not Available

    1993-01-15

    This Reference Book contains a current copy of the Clean Water Act (excluding Section 404) and those regulations that implement the statutes and appear to be most relevant to US Department of Energy (DOE) activities. The document is provided to DOE and contractor staff for informational purposes only and should not be interpreted as legal guidance. Updates that include important new requirements will be provided periodically. Questions concerning this Reference Book may be directed to Mark Petts, EH-231 (202/586-2609).

  2. National Environmental Policy Act Compliance Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-26

    The purpose of this Order is to establish DOE internal requirements and responsibilities for implementing the National Environmental Policy Act of 1969 (NEPA), the Council on Environmental Quality Regulations Implementing the Procedural Provisions of NEPA (40 CFR Parts 1500-1508), and the DOE NEPA Implementing Procedures (10 CFR Part 1021). (Hereinafter, the latter two will be referred to as "the Regulations.") Cancels DOE O 451.1A.

  3. National Environmental Policy Act Compliance Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-10-26

    The order establishes DOE internal requirements and responsibilities for implementing the National Environmental Policy Act of 1969, the Council on Environmental Quality Regulations Implementing the Procedural Provisions of NEPA (40 CFR Parts 1500-1508), and the DOE NEPA Implementing Procedures (10 CFR Part 1021). Chg 1, dated 9-28-01; Chg 2, dated 6-25-10; Admin Chg 3, dated 1-19-12, supersedes DOE O 451.1B Chg 2.

  4. National Environmental Policy Act Compliance Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-11-10

    To establish Department of Energy (DOE) responsibilities and procedures to implement the National Environmental Policy Act of 1969 (NEPA) Cancels DOE O 5440.1D. Canceled by DOE O 451.1 of 9-11-1995 and by DOE N 251.4 & Para. 5b(1) and 6a(23) is canceled by DOE O 231.1 of 9-30-1995.

  5. Recovery Act: Demonstrating The Commercial Feasibility Of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProject Developsfor UCNIEnvironmental Impact StatementRecovery ActDepartment

  6. Recovery Act Recipient Data | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget ||DepartmentReadoutReviewRecordRecoveryRecovery Act

  7. Fair Act Inventory | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof Energy Services » Program ManagementAct4FacilityFact Sheet

  8. The Local Interstellar Medium

    E-Print Network [OSTI]

    Redfield, S

    2006-01-01

    The Local Interstellar Medium (LISM) is a unique environment that presents an opportunity to study general interstellar phenomena in great detail and in three dimensions. In particular, high resolution optical and ultraviolet spectroscopy have proven to be powerful tools for addressing fundamental questions concerning the physical conditions and three-dimensional (3D) morphology of this local material. After reviewing our current understanding of the structure of gas in the solar neighborhood, I will discuss the influence that the LISM can have on stellar and planetary systems, including LISM dust deposition onto planetary atmospheres and the modulation of galactic cosmic rays through the astrosphere - the balancing interface between the outward pressure of the magnetized stellar wind and the inward pressure of the surrounding interstellar medium. On Earth, galactic cosmic rays may play a role as contributors to ozone layer chemistry, planetary electrical discharge frequency, biological mutation rates, and cl...

  9. Special Report "The American Recovery and Reinvestment Act and the Department of Energy"

    SciTech Connect (OSTI)

    None

    2009-03-01

    The American Recovery and Reinvestment Act of 2009 (Recovery Act) was signed into law on February 17, 2009, as a way to jumpstart the U.S. economy, create or save millions of jobs, spur technological advances in science and health, and invest in the Nation's energy future. This national effort will require an unprecedented level of transparency and accountability to ensure that U.S. citizens know where their tax dollars are going and how they are being spent. As part of the Recovery Act, the Department of Energy will receive more than $38 billion to support a number of science, energy, and environmental initiatives. Additionally, the Department's authority to make or guarantee energy-related loans has increased to about $127 billion. The Department plans to disburse the vast majority of the funds it receives through grants, cooperative agreements, contracts, and other financial instruments. The supplemental funding provided to the Department of Energy under the Recovery Act dwarfs the Department's annual budget of about $27 billion. The infusion of these funds and the corresponding increase in effort required to ensure that they are properly controlled and disbursed in a timely manner will, without doubt, strain existing resources. It will also have an equally challenging impact on the inherent risks associated with operating the Department's sizable portfolio of missions and activities and, this is complicated by the fact that, in many respects, the Recovery Act requirements represent a fundamental transformation of the Department's mission. If these challenges are to be met successfully, all levels of the Department's structure and its many constituents, including the existing contractor community; the national laboratory system; state and local governments; community action groups and literally thousands of other contract, grant, loan and cooperative agreement recipients throughout the Nation will have to strengthen existing or design new controls to safeguard Recovery Act funds.

  10. Medial Axis Local Planner: Local Planning for Medial Axis Roadmaps 

    E-Print Network [OSTI]

    Manavi, Kasra Mehron

    2012-07-16

    implemented this local planner and have tested it in 2D and 3D rigid body and 8D and 16D fixed base articulated linkage environments. We compare MALP with a straight-line local planner (SL), a typical local planer used in motion planning that interpolated...

  11. Energy Policy Act of 2005 | Department of Energy

    Energy Savers [EERE]

    Policy Act of 2005 Energy Policy Act of 2005 Public Law of the 109th Congress: To ensure jobs for our future with secure, affordable, and reliable energy. More Documents &...

  12. Draft Report to Congress: Energy Policy Act of 2005, Section...

    Broader source: Energy.gov (indexed) [DOE]

    this report to Congress pursuant to Section 1813 of Public Law (Pub. L.) 109-58, the Energy Policy Act of 2005 (EPAct). Draft Report to Congress: Energy Policy Act of 2005,...

  13. National Defense Authorization Act for Fiscal Year 1993 (PL 102...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) Section 3162 of the National Defense...

  14. Draft Report to Congress: Energy Policy Act of 2005, Section...

    Office of Environmental Management (EM)

    Report to Congress: Energy Policy Act of 2005, Section 1813, Indian Land Rights-of-Way Study Draft Report to Congress: Energy Policy Act of 2005, Section 1813, Indian Land...

  15. Treasury, Energy Announce More Than $3 Billion in Recovery Act...

    Energy Savers [EERE]

    More Than 3 Billion in Recovery Act Funds for Renewable Energy Projects Treasury, Energy Announce More Than 3 Billion in Recovery Act Funds for Renewable Energy Projects July 9,...

  16. Economic Impact of Recovery Act Investments in the Smart Grid...

    Energy Savers [EERE]

    Economic Impact of Recovery Act Investments in the Smart Grid Report Now Available Economic Impact of Recovery Act Investments in the Smart Grid Report Now Available April 25, 2013...

  17. American Jobs Creation Act of 2004 (released in AEO2005)

    Reports and Publications (EIA)

    2005-01-01

    The American Jobs Creation Act of 2004 was signed into law on October 22, 2004. Most of the 650 pages of the Act are related to tax legislation. Provisions pertaining to energy are detailed in this analysis.

  18. Recovery Act Workers Accomplish Cleanup of Second Cold War Coal...

    Office of Environmental Management (EM)

    June 21, 2011 Recovery Act Workers Accomplish Cleanup of Second Cold War Coal Ash Basin AIKEN, S.C. - American Recovery and Reinvestment Act workers re- cently cleaned up a second...

  19. Public Utility Regulatory Policies Act of 1978 (PURPA) as Applicable...

    Office of Environmental Management (EM)

    as Applicable to the Energy Policy Act of 2005 (EPACT 2005) -List of Covered Electric Utilities - 2006 Public Utility Regulatory Policies Act of 1978 (PURPA) as Applicable to the...

  20. Acting Under Secretary of Energy David Sandalow's Remarks at...

    Office of Environmental Management (EM)

    Acting Under Secretary of Energy David Sandalow's Remarks at the U.S.-Brazil Wind Workshop - As Prepared for Delivery Acting Under Secretary of Energy David Sandalow's Remarks at...