Powered by Deep Web Technologies
Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Headquarters Program & Staff Office Mailing Addresses | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Program & Staff Office Mailing Headquarters Program & Staff Office Mailing Addresses Headquarters Program & Staff Office Mailing Addresses The following addresses are for delivery of regular mail and small packages: Delivery to the Headquarters buildings in Washington, DC: Name of Individual Title Routing Symbol/Forrestal Building U.S. Department of Energy 1000 Independence Ave., S.W. Washington, DC 20585 Name of Individual Title Routing Symbol/L'Enfant Plaza Building U.S. Department of Energy 1000 Independence Ave., S.W. Washington, DC 20585-1615 Delivery to the Headquarters buildings in Germantown, MD: Name of Individual Title Routing Symbol/Germantown Building U.S. Department of Energy 1000 Independence Ave., S.W. Washington, DC 20585-1290 Name of Individual Title Routing Symbol/Cloverleaf Building

2

Mailing Addresses and Information Numbers for Operations, Field, and Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

About Energy.gov » Mailing Addresses and Information Numbers for About Energy.gov » Mailing Addresses and Information Numbers for Operations, Field, and Site Offices Mailing Addresses and Information Numbers for Operations, Field, and Site Offices Name Telephone Number U.S. Department of Energy Ames Site Office 111 TASF, Iowa State University Ames, Iowa 50011 515-294-9557 U.S. Department of Energy Argonne Site Office 9800 S. Cass Avenue Argonne, IL 60439 630-252-2000 U.S. Department of Energy Berkeley Site Office Berkeley National Laboratory 1 Cyclotron Road Berkeley, CA 94720 510-486-5784 U.S. Department of Energy Bonneville Power Administration P.O. Box 3621 905 NE 11th Avenue Portland, OR 97232 Bonneville Power Administration General and Regional Offices 503-230-3000 U.S. Department of Energy Brookhaven Site Office Upton, NY 11973 631-344-5050

3

Mailing Addresses for National Laboratories and Technology Centers |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mailing Addresses for National Laboratories and Mailing Addresses for National Laboratories and Technology Centers Mailing Addresses for National Laboratories and Technology Centers Name Telephone Number U.S. Department of Energy Albany Research Center 1450 Queen Ave. SW Albany, OR 97321-2198 541-967-5892 U.S. Department of Energy Ames Laboratory #311 TASF, Iowa State University Ames, Iowa 50011 515-294-2680 U.S. Department of Energy Argonne National Laboratory (East) 9700 S. Cass Avenue Argonne, IL 60439 630-252-2000 U.S. Department of Energy Argonne National Laboratory (West) P.O. Box 2528 Idaho Fall, ID 83403-2528 208-533-7341 U.S. Department of Energy Bettis Atomic Power Laboratory, Bechtel Bettis, Inc. 814 Pittsburgh McKeesport Boulevard West Mifflin, PA 15122-0079 412-476-5000 U.S. Department of Energy

4

Technical Options to Address Cyber Security, Interoperability...  

NLE Websites -- All DOE Office Websites (Extended Search)

Technical Options to Address Cyber Security, Interoperability and Other Issues with ZigBee SEP Title Technical Options to Address Cyber Security, Interoperability and Other Issues...

5

Report Period: EIA ID NUMBER: Appendix A: Mailing Address: Appendix B:  

U.S. Energy Information Administration (EIA) Indexed Site

Report Period: Report Period: EIA ID NUMBER: Appendix A: Mailing Address: Appendix B: Zip Code - Secure File Transfer option available at: - - - - Email form to: OOG.SURVEYS@eia.doe.gov Fax form to: (202) 586-9772 Email address: Oil & Gas Survey U.S. Department of Energy Ben Franklin Station PO Box 279 Washington, DC 20044-0279 Questions? Call toll free: 1-800-638-8812 1. Total Acquisitions (Enter the total volume of foreign crude oil acquired during the report month for importation into the United States. This is the sum of column (l), Part III, excluding resubmission.) 2. Offshore Inventories (Enter the total volume of foreign oil owned by the firm, for eventual importation into the United States which is held in storage outside the United States and/or is enroute to the United States as of the

6

DIEGO FAZI Mailing address: Solar Energy Conversion Group Chemical Sciences & Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

DIEGO FAZI DIEGO FAZI Mailing address: Solar Energy Conversion Group Chemical Sciences & Engineering Division Bldg 200, Room E105 Argonne National Laboratory 9700 South Cass Ave. Argonne IL 60439-4831 E-mail addresses: dfazi@anl.gov Office Number: 630-252-5796 Fax: 630-252-9289 Personal Pages: http://faculty.wcas.northwestern.edu/diego-fazi/ http://www.fazid.org Research Interests Diego Fazi comes from a theoretical Physics background and he performed research in gravitational-wave astronomy within the project LIGO from 2005 to 2012. In October 2012 Dr. Fazi joined the CSE division at Argonne as a postdoctoral appointee in the Solar Conversion

7

*Corresponding author. E-mail address: agagroup@olympus.ece.jhu.edu (A.G. Andreou).  

E-Print Network (OSTI)

*Corresponding author. E-mail address: agagroup@olympus.ece.jhu.edu (A.G. Andreou). This research and Computer Engineering, The Johns Hopkins University, 3400 N. Charles Street, Baltimore, MD 21211, USA contains eight photoreceptors which receive light through a facet lens and respond in graded fashion

Maryland at College Park, University of

8

Mailing Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Mailing Services Mailing Services Use the form below to add your name to the Depleted UF6 Mailing List. First Name: Last Name: Organization: Address: City: State: Postal Code:...

9

Using the Internet DNS to Distribute RFC1327 Mail Address Mapping Tables  

Science Conference Proceedings (OSTI)

This memo defines how to store in the Internet Domain Name System the mapping information needed by e-mail gateways and other tools to map RFC822 domain names into X.400 O/R names and vice versa. Mapping information can be managed in a distributed rather ...

C. Allocchio; A. Bonito; B. Cole; S. Giordano; R. Hagens

1994-08-01T23:59:59.000Z

10

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

using a secure method of transmission: HTTPS. This is an industry standard method to send information over the web using secure, encrypted processes. (It is the same method that commercial companies communicate with customers when transacting business on the web.) To use this service, we recommend the use of Microsoft Internet Explorer 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://idc.eia.doe.gov/upload/noticeoog.jsp." using a secure method of transmission: HTTPS. This is an industry standard method to send information over the web using secure, encrypted processes. (It is the same method that commercial companies communicate with customers when transacting business on the web.) To use this service, we recommend the use of Microsoft Internet Explorer 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://idc.eia.doe.gov/upload/noticeoog.jsp." ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," OMB No. 1905-0057" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," Expiration Date: 7/31/2016" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," Version No: 2013.002" "ANNUAL REPORT OF THE ORIGIN OF NATURAL GAS LIQUIDS PRODUCTION"

11

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0174" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 12/31/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2013.01" "FORM EIA-782A" "REFINERS'/GAS PLANT OPERATORS' MONTHLY PETROLEUM PRODUCT SALES REPORT" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction. See Instructions for further details on the sanctions and the provisions concerning the confidentiality of information submitted on this form."

12

change_address_111609  

NLE Websites -- All DOE Office Websites (Extended Search)

CHANGE OF ADDRESS and EMERGENCY NOTIFICATION CHANGE OF ADDRESS and EMERGENCY NOTIFICATION TO: HUMAN RESOURCES DATE: Z# Social Security # Print First Name Print Middle Name or Initial Print Last Name (Currently in Payroll System) Complete appropriate changes: NAME CHANGE: Print Name Change to ADDRESS CHANGE: Mailing Address City State Zip

13

IPv6 stateless address autoconfiguration: balancing between security, privacy and usability  

Science Conference Proceedings (OSTI)

Included in the IPv6 suite is a method for devices to automatically configure their own addresses in a secure manner. This technique is called Cryptographically Generated Addresses (CGAs). CGA provides the ownership proof necessary for an IPv6 address ... Keywords: IPv6 address autoconfiguration, IPv6 security, users' privacy

Ahmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel

2012-10-01T23:59:59.000Z

14

Weekly Address: Time to Create the Energy Security Trust | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Weekly Address: Time to Create the Energy Security Trust Weekly Address: Time to Create the Energy Security Trust Weekly Address: Time to Create the Energy Security Trust March 18, 2013 - 3:23pm Addthis Matt Compton Deputy Director of Online Content for the Office of Digital Strategy at the White House. Editor's Note: This blog is cross-posted from WhiteHouse.gov. President Obama discusses the need to harness American energy in order to reduce our dependence on oil and make the United States a magnet for new jobs. He highlights his all-of-the-above approach to American energy -- including a proposal to establish an Energy Security Trust, which invests in research that will help shift our cars and trucks off of oil. Addthis Related Articles National Energy Action Month Photo courtesy of the Pacific Northwest National Laboratory.

15

Metered Mail Form International Mail Only  

E-Print Network (OSTI)

Metered Mail Form International Mail Only Charge to Department USPS First Class Mail International International Metered Mail Form and must be kept separate from all other domestic mail. · International mail

Palmeri, Thomas

16

Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce  

Science Conference Proceedings (OSTI)

This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

None

2008-06-30T23:59:59.000Z

17

Tobias Maile  

NLE Websites -- All DOE Office Websites (Extended Search)

Tobias Maile Tobias Maile 1 Cyclotron Road MS 90R3111 Berkeley CA 94720 (510) 486-5961 TMaile@lbl.gov This publications database is an ongoing project, and not all Division publications are represented here yet. Publications 2013 O'Donnell, James, Tobias Maile, Cody Rose, Natasa Mrazovic, Elmer Morrissey, Cynthia Regnier, Kristen Parrish, and Vladimir Bazjanac. Transforming BIM to BEM: Generation of Building Geometry for the NASA Ames Sustainability Base BIM., 2013. Download: PDF (2.98 MB) 2012 Maile, Tobias, Mangesh Basarkar, James O'Donnell, Philip Haves, and Kevin Settlemyer. "Mapping Hvac Systems for Simulation In EnergyPlus." In SimBuild 2012 IBPSA Conference. Madison, WI, USA, 2012. Download: PDF (1.24 MB) 2011 Maile, Tobias, Vladimir Bazjanac, James O'Donnell, and Matthew Garr. "A

18

PMP2000: Mailing List Form  

Science Conference Proceedings (OSTI)

Name. Title. Organization. Street/P.O. Box. City. State/Province. Zip/Postal Code. Country. Telephone. Fax. E-Mail Address...

19

Address List  

NLE Websites -- All DOE Office Websites (Extended Search)

Address List for 2 nd U.S.-China Symposium on CO 2 Emissions Control Science & Technology Participants No. Name Sex Title Organization Address Phone E-Mail 1 Ah-Hyung Alissa Park F...

20

Metered Mail Form Domestic Mail Only  

E-Print Network (OSTI)

Metered Mail Form Domestic Mail Only For USPS Mail Only Charge to Department First Class Mail Media Meter Form. · All outgoing USPS Mail that needs postage should be kept separate from all other mail already be sealed prior to being metered. Failure to properly seal this type of mail could result

Palmeri, Thomas

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

sent to the following: LSOPUBLICAFFAIRS@nnsa.doe.gov Mailing Address U.S. Department of Energy National Nuclear Security Administration Livermore Field Office P.O. Box 808, L-293...

22

UMS-dev-sec: a proposed framework to address security concerns of UMS devices  

Science Conference Proceedings (OSTI)

USB Mass Storage (UMS) devices are affordable, convenient, practical, and have the ability to interface easily with a number of operating systems, and various hardware systems. UMS devices are found among virtually any person in the workplace today. ... Keywords: UMS, USB, information loss, information security, information theft, malware, security awareness, security framework

Kegomoditswe Molotsi, Bobby L. Tait

2013-10-01T23:59:59.000Z

23

Via Mail:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2009 1, 2009 Via email: GC-62@hq.doe.gov Via Mail: Office of the Assistant General Counsel for Technology Transfer and Intellectual Property U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 ATTN: TECHNOLOGY TRANSFER QUESTIONS Dear Sir or Madam: This letter is in response to the Notice of Inquiry: Technology Transfer Practices at Department of Energy ("DOE") Laboratories. (Federal Register Vol. 73, No. 229, p. 72036). The following comments are respectfully submitted on behalf of Eastman Chemical Company ("Eastman"). Eastman is a global FORTUNE 500 company with 2007 sales of $6.8 billion and approximately

24

Unsubscribe from the Depleted UF6 E-mail List  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Unsubscribe Unsubscribe from the Depleted UF6 E-mail List This form allows you to remove yourself from the Depleted UF6 e-mail list. Type your e-mail address here:...

25

REVIEW OF THE POTENTIAL OF NUCLEAR HYDROGEN FOR ADDRESSING ENERGY SECURITY AND CLIMATE CHANGE  

SciTech Connect

Nuclear energy has the potential to exert a major positive impact on energy security and climate change by coupling it to the transportation sector, primarily through hydrogen production. In the short term, this coupling will provide carbon-free hydrogen for upgrading increasingly lower quality petroleum resources such as oil sands, offsetting carbon emissions associated with steam methane reforming. In the intermediate term, nuclear hydrogen will be needed for large-scale production of infrastructure-compatible synthetic liquid fuels. In the long term, there is great potential for the use of hydrogen as a direct vehicle fuel, most likely in the form of light-duty pluggable hybrid hydrogen fuel cell vehicles. This paper presents a review of the potential benefits of large-scale nuclear hydrogen production for energy security (i.e. displacing imported petroleum) and reduction of greenhouse gas emissions. Lifecycle benefits of nuclear energy in this context are presented, with reference to recent major publications on this topic. The status of US and international nuclear hydrogen research programs are discussed. Industry progress toward consumer-grade hydrogen fuel cell vehicles are also be examined.

James E. O' Brien

2010-06-01T23:59:59.000Z

26

Minutes from the January 10, 2013 Printing and Mail Teleconference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 10, 2013 January 10, 2013 Mail discussion Al Majors opened the meeting by discussing the Mail Management Report and latest update on status. One final report is yet to be submitted, after which close out will be accomplished. Copies will be provided to the Mail Managers once completed. Al introduced Derrick Miliner, Program Manager from the General Services Administration, Office of Government-wide Policy, and acknowledged Mr. Miliner's role in completing the Mail Management Report. Mail Security Plans A number of unclassified site specific mail security plans have been received. Requirement for classified site specific mail security plans is to submit a letter or email stating that the classified plan is in place. Mail Manager Change Notification to Headquarters

27

NIST SP 800-45 Version 2, Guidelines on Electronic Mail ...  

Science Conference Proceedings (OSTI)

Page 1. Special Publication 800-45 Version 2 Guidelines on Electronic Mail Security Recommendations of the National Institute of ...

2012-02-06T23:59:59.000Z

28

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

29

TMS: Mailing List Rentals  

Science Conference Proceedings (OSTI)

List your company in the TMS directory [MORE] ... Through utilizing a TMS mailing list, your organization can reach over 10,000 professionals within the minerals...

30

Secure NEPA Documents | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Secure NEPA Documents Secure NEPA Documents Secure NEPA Documents The Department of Energy (DOE) limits electronic access to certain NEPA documents on this website due to the potential security sensitivity of some information these documents may contain. DOE regrets any inconvenience caused by this decision, which reflects an awareness of the need to protect the public. Requesting Secure NEPA Documents You may request copies of documents by e-mail or by leaving a message on our toll-free information line at 1-800-472-2756. Please provide the following information in your request: Title and Number of Document requested First Name: Last Name: Address: City: State: Zip Code: Organization (If Applicable): E-mail: Phone: List of Secure NEPA Documents May 1, 1984 EIS-0108: Final Environmental Impact Statement

31

Secure NEPA Documents | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Secure NEPA Documents Secure NEPA Documents Secure NEPA Documents The Department of Energy (DOE) limits electronic access to certain NEPA documents on this website due to the potential security sensitivity of some information these documents may contain. DOE regrets any inconvenience caused by this decision, which reflects an awareness of the need to protect the public. Requesting Secure NEPA Documents You may request copies of documents by e-mail or by leaving a message on our toll-free information line at 1-800-472-2756. Please provide the following information in your request: Title and Number of Document requested First Name: Last Name: Address: City: State: Zip Code: Organization (If Applicable): E-mail: Phone: List of Secure NEPA Documents April 1, 2007 EIS-0376: Final Environmental Impact Statement

32

Special Mailing Distribution Lists | Staff Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Special Mailing Distribution Lists Special Mailing Distribution Lists Special mailing distribution lists -- to be used repeatedly over long periods of time -- may be established by written request to the Senior Communications Clerk, at mailroomdl@bnl.gov. It is important to notify the Senior Communications Clerk of all changes to the Mailing Distribution Lists. Assignments to all other Standard Distribution Lists are made automatically according to each employee's personnel code. Deletions resulting from terminations are effected automatically. The Mail Room maintains an automatic addressing system for the following Standard Distribution Lists: Director's Office; Department Chairs and Division Managers and their Deputies, Associate, Assistant and Acting Chairs; Division and major Section Heads in the Departments and Divisions; BSA Board of Directors.

33

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

34

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Contact Us Home > Field Offices > Welcome to the Sandia Field Office > Contact Us Contact Us If you have questions about activities at the Sandia Field Office, please contact the SFO Public Affairs Director at (505) 845-5264. Our mailing address is: U. S. Department of Energy, National Nuclear Security Administration, Sandia Field Office, P.O. Box 5400, Albuquerque, NM 87185. Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About SFO Contact Us Contract Administration & Business Management Emergency Information Facilities & Projects Nuclear Operations Environment, Safety & Health Public Affairs Safeguards & Security Performance and Quality Assurance

35

Minutes from the June 28, 2012 Printing and Mail Teleconference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 28, 2012 Mail discussion Al Majors opened the meeting by introducing United Parcel Service (UPS) Representative Shelly Scott. Ms. Scott's contact information is: Shelly Scott shellyscott@ups.com 404 402-9827 (cell) Ms. Scott discussed issues relating to various UPS services available to the department. Next Al introduced Michael R. Sanders, President and Chief Executive Officer of Intra-Mail Network, an innovative, information Technology Company that improves the delivery of mail or email to individuals at institutions. Mr. Sanders provided an overview of services and capabilities available to help eliminate mailing-related problems. DOE Headquarters Mail Center is currently conducting a mailing list clean up (pilot) with Intra-Mail Network to eliminate the unwanted incoming junk mail addressed to Headquarters

36

pine (mail utility info)  

NLE Websites -- All DOE Office Websites (Extended Search)

pine (mail utility info) pine (mail utility info) Basics, FAQ, etc, On our UNIX machines, module load pine The line module load pine should ALSO be in the file ~/.rc/user_modules (The pine module also includes pico) pine usage with IMAP4 (UNIX) Moving pine email files into IMAP4 LBNL UNIX info on pine links to Pine Information Center Pine 4.2.1/Solaris: Forwarding as attachment; the following procedure has proved successful for at least some users: Check the option "enable-full-header-cmd". To get to this option, 1. M (Main Menu) 2. S (Setup) "Choose a setup task from the menu below :" 3. C (Configure) 4. Scroll down to "Advanced Command Preferences", and press "X" to set "enable-full-header-cmd". It looks like this: ================================================================

37

Federal Engagement in Standards Activities to Address ...  

Science Conference Proceedings (OSTI)

... panels and coordination initiatives that address key national priorities, including homeland security, nanotechnology, biofuels, nuclear energy ...

2012-11-15T23:59:59.000Z

38

Mailing Addresses and Information Numbers for Operations, Field...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

509-376-7411 U.S. Department of Energy Rocky Mountain Oilfield Testing Center 907 N. Poplar, Suite 150 Casper, WY 82601 307-233-4800 U.S. Department of Energy Sandia Site Office...

39

Mailing Address: Center for Energy and Environmental Policy  

E-Print Network (OSTI)

..................................................................................................................... 23 2.2 Cost Comparison for Centralized Power Generation Technologies) ........................................................................... 31 2.3 Cost Comparison for Distributed Power Generation Technologies only about 0.51% of the total global installed power generation capacity of about 4 TW estimated

Delaware, University of

40

Mailing Addresses for National Laboratories and Technology Centers...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Center 1450 Queen Ave. SW Albany, OR 97321-2198 541-967-5892 U.S. Department of Energy Ames Laboratory 311 TASF, Iowa State University Ames, Iowa 50011 515-294-2680 U.S....

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Contact Us | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Us Contact Us Contact Us Mail and delivery address information: Y-12 National Security Complex P.O. Box 2009 Oak Ridge, TN 37831-8245* Non-mail deliveries: Bear Creek Road P.O. Box 2009 Oak Ridge, TN 37830 *This mailstop is for general inquiries. For other mail, please contact the intended recipient for the appropriate mailstop. If you don't find what you're looking for on our Home Page or through our Search page, try one of the resources listed below. Media Inquiries Ellen Boatner, 865.241.4937 Public and Governmental Affairs Alice Brandon, 865.576.2963 Benefits One Call, 865.574.1500 New Hope Center Public Use Areas Ray Smith, 865.576.7781 Procurement procurement@y12.doe.gov, 865.576-8500 Socioeconomic Programs Lisa Copeland, 865.576.2090 Employment Staffing, staff@y12.doe.gov, 865.576.1377

42

FTCP Site Specific Information - Office of Health, Safety & Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security FTCP Site Specific Information - Office of Health, Safety & Security FTCP Agent Organization Name Phone E-Mail HSS HQ Pat Worthington Bradley Davy 301903-6929 301...

43

Native Village of Teller Addresses Heating Fuel Shortage, Improves...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security June 22, 2012...

44

Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security  

SciTech Connect

The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

Electric Power Research

2007-11-01T23:59:59.000Z

45

UTC e-mail | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UTC e-mail UTC e-mail Fuel Cells in the QTR UTC e-mail More Documents & Publications Air Products Hydrogen Energy Systems Fuel Cell and Hydrogen Energy Association...

46

Minutes from the February 23, 2012 Printing and Mail Teleconference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Printing and Mail Managers Exchange Forum Teleconference February 23, 2012 Participants: Headquarters (5) National Energy Technology Laboratory, PA National Security Complex Y-12 (2) Oak Ridge National Laboratory Y-12 Site Office (2) Hanford Site Office Oak Ridge Association University Oak Ridge Operations Office BWXT Pantex Site Office JanTec Corporation, Richland, Washington Los Alamos National Laboratory Chicago Office Bettis Atomic Power Laboratory National Security Technology C1, Las Vegas SLAC National Accelerator Laboratory Comments/Additions to minutes from last meeting. There were no comments. Printing Agenda Items......... Update on the Department-wide Printing and Publishing Activities Three-Year Plan (2013-2015).

47

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

48

Work Address:  

NLE Websites -- All DOE Office Websites (Extended Search)

BO SAULSBURY BO SAULSBURY Work Address: Home Address: Oak Ridge National Laboratory 12952 Buckley Road National Transportation Research Center Knoxville, TN 37934 Building NTRC-2, Room 118 (865) 288-0750 Oak Ridge, TN 37831-6479 (865) 574-4694 saulsburyjw@ornl.gov Technical Specialties: Land use planning Environmental and socioeconomic impact assessment National Environmental Policy Act (NEPA) project management Vehicle fuel economy Education: 1986 B. A., History (minors in English and Business), The University of Tennessee 1989 M. S., Planning, The University of Tennessee (Thesis title: Land Use Compatibility Planning for Airfield Environs: Intergovernmental Cooperation to Protect Land Users From the Effects of Aircraft Operations)

49

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

50

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

51

CPEP products and Mailing List  

NLE Websites -- All DOE Office Websites (Extended Search)

CPEP es una organización sin fines de lucro formada por profesores, CPEP es una organización sin fines de lucro formada por profesores, educadores, y físicos. Los materiales preparados por el CPEP presentan los conocimientos actuales sobre la naturaleza fundamental de la materia y la energía, incorporando los principales descubrimientos e investigaciones de las tres últimas décadas. Los productos desarrollados por el CPEP están disponibles por intermedio de nuestro distribuidor: Science Kit 777 Park Drive Tonawanda, NY 14150 USA Phone: 1(800)828-7777 or 1(716)874-6020 FAX: 1(716)874-9572 Para obtener información (sin efectuar una orden de compra) o para ser incorporado en nuestra lista de correo dirigirse a: E-mail: pdg@lbl.gov or Call: 1(510)486-5885, or Write: CPEP MS 50-308, Lawrence Berkeley National Laboratory,

52

Mail and Distribution | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Facility Operations Food Services Graphics Mail and Distribution Parking and Garage Photography Printing Recycling Safety and Health Shuttle Bus and Couriers Supply...

53

Field Facilities Contacts for Printing and Mail  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facilities Contacts for Printing and Mail Facilities Contacts for Printing and Mail Print and Mail Contacts Site Printing Contact Mail Contact NNSA, Albuquerque Deborah Miller (505) 845-6049 Thomas H. Clinkenbeard NNSA Service Center PO Box 5400 Albuquerque, NM 87185-5400 (505) 845-4602 tclinkenbeard@doeal.gov (mailto:tclinkenbeard@doeal.gov) Argonne National Laboratory Doreen Schoening Argonne National Laboratory U.S. Department of Energy 9700 South Cass Avenue Blvd 340 Lemonmt, IL 60439 (630) 840-6399 dschoening@anl.gov (mailto:dschoening@anl.gov) Bechtel Jacobs James Hughes Bechtel Jacobs - Mail Stop 7294 U.S. Department of Energy PO Box 4699 Oak Ridge, TN 37831 (865) 576-8423 Berkeley Site Office Mercedes Downing Berkeley Site Office U.S. Department of Energy 1 Cyclotron Road Bldg 90

54

Why isn't cyberspace more secure?  

Science Conference Proceedings (OSTI)

Evaluating governmental actions---and inactions---toward improving cyber security and addressing future challenges.

Joel F. Brenner

2010-11-01T23:59:59.000Z

55

Minutes from the Print and Mail Managers Exchange Forum Teleconferences |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Minutes from the Print and Mail Managers Exchange Forum Minutes from the Print and Mail Managers Exchange Forum Teleconferences Minutes from the Print and Mail Managers Exchange Forum Teleconferences Minutes from the Print and Mail Managers Exchange Forum Teleconferences. Contact the Office of Administrative Management and Support at (202) 586-4318 with any questions. Last updated 04/01/13 Minutes from the March 14, 2013 Printing and Mail Teleconference Minutes from the January 10, 2013 Printing and Mail Teleconference Minutes from the November 01, 2012 Printing and Mail Teleconference Minutes from the June 28, 2012 Printing and Mail Teleconference Minutes from the May 03, 2012 Printing and Mail Teleconference Minutes from the February 23, 2012 Printing and Mail Teleconference Minutes from the October 26, 2011 Printing and Mail Teleconference

56

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

57

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

58

MIME Extensions for Mail-Enabled Applications: application/Safe-Tcl and multipart/enabled-mail  

E-Print Network (OSTI)

MIME [RFC-MIME] defines a format and general framework for the representation of a wide variety of data types in Internet mail. This document defines two new subtypes of MIME data, the application/Safe-Tcl and multipart/enabled-mail subtypes, for providing Enabled Mail [EM-MODEL] in the Internet community. A table of contents appears at the end of this document. 1. Overview Most electronic mail, even multimedia mail as standardized in MIME [RFC-MIME], is "passive" in the sense that the data are unidirectional. Textual, image, audio, or video data are simply displayed to the user, who reads, views, listens, or watches it and then must take specific action to initiate any response to the data, such as to reply to the originator, to replay the data, or to redistribute it to other recipients. Less commonly used, but the subject of considerable research attention, has been "active" mail, in which the data delivered through the mail constitute a program in a well-specified language, allowi...

Nathaniel Borenstein; Nathaniel Borenstein Bellcore

1993-01-01T23:59:59.000Z

59

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

60

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

62

(1) Facility Name: (7) Business Name: (2) Brand of Fuel: (8) Mailing Address  

E-Print Network (OSTI)

Tank Capacity (Gallons) Midgrade Gasoline (89 Octane) Product (13) Annual Sales Volume (Gallons) (14 (Explain): Bio-Diesel (B-20) Compressed Natural Gas (CNG) Commercial Jet Fuel (18) Propane Finished

63

*Corresponding author. E-mail address: #ame@zen.phys.columbia.edu (J. Hong).  

E-Print Network (OSTI)

Nuclear Instruments and Methods in Physics Research A 540 (2005) 464­469 Fusion neutron detector calibration using a table-top laser generated plasma neutron source R. Hartkea , D.R. Symesa,?, F. Buersgensa, Department of Physics, The University of Texas at Austin, Austin, TX 78712, USA b Sandia National

64

Report Period: EIA ID NUMBER: Instructions: (e.g., Street Address, Bldg, Floor, Suite)  

U.S. Energy Information Administration (EIA) Indexed Site

Report Period: Report Period: EIA ID NUMBER: Instructions: (e.g., Street Address, Bldg, Floor, Suite) Secure File Transfer option available at: (e.g., PO Box, RR) Electronic Transmission: The PC Electronic Data Reporting Option (PEDRO) is available. Zip Code: - If interested in software, call (202) 586-9659. Email form to: Fax form to: (202) 586-9772 - - Mail form to: Oil & Gas Survey - - U.S. Department of Energy Ben Franklin Station PO Box 279 Washington, DC 20044-0279 Questions? Call toll free: 1-800-638-8812 OOG.SURVEYS@eia.doe.gov Contact Name: Version No.: 2013.01 Date of this Report: Mo Day State: Year Phone No.: DOMESTIC CRUDE OIL FIRST PURCHASE REPORT Company Name: A completed form must be filed by the 30th calendar day following the end of the report

65

Leadership Development Series: "A Holistic Look at Cyber Security" |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" January 30, 2014 10:30AM to 12:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast & Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Dr. Steven Bucci, Director, Douglas and Sarah Allison Center for Foreign Policy Studies. The sheer volume of cyber activity is masking serious threats that impact government, business and our personal lives every day. Incidents are now ubiquitous, pervasive and constitute the new "normal". These day to day threats are not existential, but if not addressed, will hinder our

66

Intraorganizational Versus Interorganizational Uses and Benefits of Electronic Mail  

Science Conference Proceedings (OSTI)

The success of an organization depends on rapid, reliable, and direct communications within the organization and with the outside world. To determine if electronic mail e-mail provides a competitive benefit, a sample of 99 management-level participants ...

Denise J. McManus; Chetan Sankar; Houston H. Carr; F. Nelson Ford

2002-07-01T23:59:59.000Z

67

Simulation-based optimization of a complex mail transportation network  

Science Conference Proceedings (OSTI)

The Swedish Postal Services receives and distributes over 22 million pieces of mail every day. Mail transportation takes place overnight by airplanes, trains, trucks, and cars in a transportation network comprising a huge number of possible routes. For ...

Anna Syberfeldt; Henrik Grimm; Amos Ng; Martin Andersson; Ingemar Karlsson

2008-12-01T23:59:59.000Z

68

arXiv.org - Mailings from the physics archive  

NLE Websites -- All DOE Office Websites (Extended Search)

Mailings from the physics archive Submissions to the new physics archive and the reorganized cond-mat archive now include Subj-class: headings . It is possible to receive mailings...

69

Federal Energy Management Program: Energy Independence & Security Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence & Security Act to someone by E-mail Share Federal Energy Management Program: Energy Independence & Security Act on Facebook Tweet about Federal Energy Management Program: Energy Independence & Security Act on Twitter Bookmark Federal Energy Management Program: Energy Independence & Security Act on Google Bookmark Federal Energy Management Program: Energy Independence & Security Act on Delicious Rank Federal Energy Management Program: Energy Independence & Security Act on Digg Find More places to share Federal Energy Management Program: Energy Independence & Security Act on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act

70

Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach  

Science Conference Proceedings (OSTI)

Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. However, each security technology only addresses specific vulnerabilities and ... Keywords: Genetic algorithms, Information security

Mukul Gupta; Jackie Rees; Alok Chaturvedi; Jie Chi

2006-03-01T23:59:59.000Z

71

Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach  

Science Conference Proceedings (OSTI)

Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. However, each security technology only addresses specific vulnerabilities and ... Keywords: genetic algorithms, information security

Mukul Gupta; Jackie Rees; Alok Chaturvedi; Jie Chi

2006-03-01T23:59:59.000Z

72

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

73

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

notice914.jsp" notice914.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0205" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 05/31/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Burden: 3 hours" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"MONTHLY NATURAL GAS PRODUCTION REPORT",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2011.001" "FORM EIA-914" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see the form instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

74

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

C" C" "MONTHLY REPORT OF PRIME SUPPLIER SALES OF PETROLEUM PRODUCTS" "SOLD FOR LOCAL CONSUMPTION" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction. See Instructions for further details on the sanctions and the provisions concerning the confidentiality of information submitted on this form." "PART 1. RESPONDENT IDENTIFICATION DATA",,,,,,,,,,,,,,,,,,,,,,,"PART 2. SUBMISSION INFORMATION"

75

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

76

Securing America's Future Energy April 8, 2011 | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

America's Future Energy an e-mail with attachments of a New York Times article on oil prices. Securing America's Future Energy April 8, 2011 More Documents & Publications Response...

77

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

78

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > Field Offices > Welcome to the NNSA Production Office > Contact Us Contact Us NPO Public Affairs Steven Wyatt (865) 576-9918 NPO Mailing Address NNSA Production Office PO...

79

NETL F 141.1-2 NETL's Mailing List Request  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Energy Restoration Natural Gas Permitting, Siting and Analysis Gas Exploration, Production and Storage Control Systems Security Infrastructure...

80

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Minutes from the Print and Mail Managers Exchange Forum Teleconference...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Mail Teleconference More Documents & Publications Identification and Prioritization of Technical Issues July 19, 2012 SEAB Minutes Lessons Learned Quarterly Report, March 2013...

82

Addressing Energy Demand  

NLE Websites -- All DOE Office Websites (Extended Search)

Addressing Energy Demand through Demand Response: International Experiences and Practices Bo Shen, Girish Ghatikar, Chun Chun Ni, and Junqiao Dudley Environmental Energy...

83

Data-Driven Mailing Helps Heat Up Untapped Seattle Market  

NLE Websites -- All DOE Office Websites (Extended Search)

Focus Series Focus Series Data-Driven Mailing Helps Heat Up Untapped Seattle Market Recognizing owners of oil-heated homes in Seattle, Washington, as a long-untapped market, Community Power Works engaged them through a direct mail campaign in April 2012. Not only did the mailing generate hundreds of sign-ups, but the number of oil-heated homes initiating upgrades increased to 50% in the six months after the mailing. In the interview below, Community Power Works Project Manager Ruth Bell and Program/System Analyst Vince Schueler of the Washington State University (WSU) Energy Program 1 provide a summary of the successes and lessons learned. Following the interview is an example letter used by Community Power Works in its direct mail outreach. Q. Why focus on oil-heated homes in Seattle?

84

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

85

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

86

An Operations Research approach to aviation security  

E-Print Network (OSTI)

Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

Martonosi, Susan Elizabeth

2005-01-01T23:59:59.000Z

87

Addressing Missclassified Positions  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2009 2 2009 MEMORANDUM FOR HUMAN RESOURCE DIRECTORS FROM: CAPITAL OFFICER SUBJECT: GULDANCE MEMORANDUM #3: Addressing Misclassified Positions This memorandum provides policy guidance on how to consistently address misclassified positions within the Department and is effective immediately. There are several different circumstances that affect how a misclassified position will be addressed. These are discussed below: If it is determined that a position is classified to the wrong title, then the classification must be corrected immediately. If it is determined that a position is classified to the wrong series, then the classification must be corrected immediately. Note: The series determination involves distinguishing between one-grade interval work and two-grade interval

88

Alternative Fuels Data Center: State Agency Coordination to Address Climate  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

State Agency State Agency Coordination to Address Climate Change to someone by E-mail Share Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on Facebook Tweet about Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on Twitter Bookmark Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on Google Bookmark Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on Delicious Rank Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on Digg Find More places to share Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

89

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

90

April 8, 2013 VIA MAIL Diane Honeycutt National Institute of ...  

Science Conference Proceedings (OSTI)

... y y y The MME shall use DIAMETER for retrieval of security data from HSS for UE NAS security (in accordance with 3GPP) y ...

2013-04-10T23:59:59.000Z

91

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

92

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

93

Next Generation SSH2 Implementation: Securing Data in Motion, 1st edition  

Science Conference Proceedings (OSTI)

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most ... Keywords: Security

Max Caceres; Aaron E. Earle; Devin Ganger; Wipul Jayawickrama; Jan Kanclirz; Dane Liu; Tim Robichaux; Eric S. Seagren; Brad Smith; Christopher Stokes

2008-11-01T23:59:59.000Z

94

Minutes from the May 26, 2010 Printing and Mail Teleconference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2010 26, 2010 Printing and Mail Managers Exchange Forum Teleconference Seventeen individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors. Comments/Additions to last Months Minutes Dallas Woodruff, Headquarters opened the meeting by thanking everyone for participating in the today's teleconference. Printing Agenda Items... Update on the FY 2010, Congressional Joint Committee on Printing Commercial Printing Report "JCP Form No. 2" Dallas Woodruff, Headquarters informed the group that Headquarters received responses from all DOE printing and duplicating facilities. The report is due to the Congressional Joint Committee on Printing no later than May 31, 2010.

95

Secure Communication for Advanced Metering that Preserves User ...  

a much greater concern as power information is shared over Internet connections. While conventional encryption techniques can address security concerns, ...

96

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

97

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

98

Minutes from the September 15, 2010 Printing and Mail Teleconference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 15, 2010 Printing and Mail Managers Exchange Forum Teleconference September 15, 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty-four individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors. Comments/Additions to last Months Minutes Dallas Woodruff, Headquarters opened the meeting by thanking everyone for participating in the today's teleconference. Printing Agenda Items... Upcoming FY 2010 Department-wide Three-Year Plan Dallas Woodruff, Headquarters informed the group that the programmer has been making modifications to the spreadsheets such as the narrative section, equipment installed year, sites data consolidation etc. The enhancement to the narrative section will allow sites to enter data into the four narrative sections, which allow

99

Collaborative spam filtering using e-mail networks  

E-Print Network (OSTI)

program determines that (TTL). the e-mail is de?nitely spam,walk of the same length as the TTL on a short random walklength l, which is the TTL. used in the content implantation

Kong, Joseph S; Rezaei, B A; Sarshar, N; Roychowdhury, V P; Boykin, P O

2006-01-01T23:59:59.000Z

100

Name Title Work Phone Work E-Mail  

NLE Websites -- All DOE Office Websites (Extended Search)

12012 EOTA - STAFF Name Title Work Phone Work E-Mail Melissa Otero Program Manager 505-842-7112 motero@eota.energy.gov Janet Lee Online Learning Support Specialist 505-842-7110...

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

FAQS Reference Guide Safeguards and Security  

Energy.gov (U.S. Department of Energy (DOE))

This reference guide addresses the competency statements in the May 2009 edition of DOE-STD-1171-2009, Safeguards and Security Functional Area Qualification Standard.

102

Privacy and Security Research Group workshop on network and distributed system security: Proceedings  

Science Conference Proceedings (OSTI)

This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

Not Available

1993-05-01T23:59:59.000Z

103

Securing vehicular ad hoc networks  

Science Conference Proceedings (OSTI)

Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate ... Keywords: Vehicular ad hoc networks, security, wireless

Maxim Raya; Jean-Pierre Hubaux

2007-01-01T23:59:59.000Z

104

Federal Energy Management Program: Energy Independence and Security Act,  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements to someone by E-mail Share Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Facebook Tweet about Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Twitter Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Google Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Delicious

105

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

106

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

107

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

108

T-618: Debian update for exim4: Mail Transport Agent | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

mail transport agent in Debian, uses DKIM data obtain from DNS directly in a format string, potentially allowing malicious mail senders to execute arbitrary code. reference...

109

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities April 27,...

110

Markteting Expertise List page 1 of 6 First Name Last Name Title Affiliation Mailing Address Country Phone Fax eMail Expertise/Research Area(s) Secondary eMail URL  

E-Print Network (OSTI)

+903 122-964147 +903 122-234532 ramazan12000@yahoo.com http://www.ogm.gov.tr Robert Beauregard Canada 418 656 7684 robert.beauregard@sbf.ulaval.ca Secondary wood products; Product development

111

Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Native Village of Teller Addresses Heating Fuel Shortage, Improves Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security June 22, 2012 - 4:54pm Addthis The combination of the Native Village of Teller’s limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL The combination of the Native Village of Teller's limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security Native Village of Teller fuel storage. Photo by Alexander Dane, NREL Native Village of Teller fuel storage. Photo by Alexander Dane, NREL The combination of the Native Village of Teller's limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL

112

Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Native Village of Teller Addresses Heating Fuel Shortage, Improves Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security June 22, 2012 - 4:54pm Addthis The combination of the Native Village of Teller’s limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL The combination of the Native Village of Teller's limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security Native Village of Teller fuel storage. Photo by Alexander Dane, NREL Native Village of Teller fuel storage. Photo by Alexander Dane, NREL The combination of the Native Village of Teller's limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL

113

WinSEND: Windows SEcure Neighbor Discovery  

Science Conference Proceedings (OSTI)

Neighbor Discovery Protocol (NDP) is an essential protocol in IPv6 suite, but it is known to be vulnerable to critical attacks. Thus, SEcure Neighbor Discovery (SEND) is proposed to counter NDP security threats. Unfortunately, operating systems lack ... Keywords: cryptographically generated addresses (cga), ipv6 security and protection, neighbor discovery protocol (ndp), send implementation

Hosnieh Rafiee; Ahmad Alsa'deh; Christoph Meinel

2011-11-01T23:59:59.000Z

114

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

115

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

116

Minutes from the November 17, 2010 Printing and Mail Teleconference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 17, 2010 November 17, 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty seven individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors Comments/Additions to last Months Minutes No comments. Printing Agenda Items......... Update on the Department-wide "Three-Year Plan" Dallas Woodruff, Headquarters opened the meeting by thanking everyone for providing their sites Three-Year Plan data to Headquarters in timely manner. Mr. Woodruff went on to say a number of individuals indentified a problem with the narrative section of the PPAFI Spreadsheets (unable to print the narratives). Mr. Woodruff notified the programmer of the narrative section printing glitch.

117

Minutes from the January 19, 2011 Printing and Mail Teleconference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 2010 January 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty-one individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors Comments/Additions to last Months Minutes No comments. Printing Agenda Items......... Update on the Department-wide FY-2010 Three-Year Plan Dallas Woodruff, Headquarters in formed the group that the Department-wide Printing and Publishing Activities is currently in the concurrence process. The report is due to congress by February 11, 2011. Mr. Woodruff thanks those that assisted in development of the report and he asked for recommendations on how to make the data submission more users friendly. Mr Woodruff also asked members to share any concern or problems they experienced regarding to using the Excel

118

Minutes from the March 17, 2010 Printing and Mail Teleconference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 17, 2010 March 17, 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty-eight individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors. Comments/Additions to last Months Minutes Dallas Woodruff, Headquarters opened the meeting by thanking everyone for participating in the today's teleconference. Printing Agenda Items... Upcoming Congressional Joint Committee on Printing Commercial Printing Report "JCP Form No. 2" Dallas Woodruff, Headquarters informed the group that sites should receive the call letter for the report on or around March 30, 2010. The report is due back to Headquarters by May 3, 2009. Mr. Woodruff reminded the group that they must report negative responses as well.

119

Minutes from the January 20, 2010 Printing and Mail Teleconference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

, 2010 , 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty-one individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors. Comments/Additions to last Months Minutes Dallas Woodruff, Headquarters opened the meeting by thanking everyone for participating in the today's teleconference. Printing Agenda Items... Update on the Department-wide Printing and Publishing Activities Report Three-Year Plan. Dallas Woodruff, Headquarters thanked the group for their contributions made to the Department-wide printing program during FY 2009. Mr Woodruff also thanked the group for providing data for the FY 2009 Three-Year Plan in a timely manner. The Three-Year Plan is in track for completion before the February

120

Office of Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Office of Security Mission and Functions The Office of Security (HS-50) is one of the major subordinate offices within the Office of Health, Safety and Security (HSS). HS-50 is committed to improving the Department's safeguards and security posture by providing safeguards and security subject matter expertise upon request to assist field and Headquarters elements and by deploying safeguards and security technologies that serve as force multipliers for addressing the emerging and challenging threats faced by the Department. As the Departments principal security office, we work closely with the program offices, field sites, Headquarters, and with the other offices within HSS to ensure that site assistance efforts are well coordinated and that the lessons learned from security assistance and deployed technologies

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Address EJ Conference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Congressman Clyburn to Congressman Clyburn to Address EJ Conference Congressman Clyburn has graciously agreed to speak at The State of Environmental Justice in America 2011 Conference. Congressman Clyburn (D - SC) has been a member of the U.S. House of Congress since 1993. He has held the positions of Chairman of the Democratic Black Caucus, House Democratic Caucus Vice Chair, Chair of the Democratic Caucus and from 2006 until January 2011, was the House Majority Whip. Currently, as Assistant Democratic Leader in the 112th Congress and the number three Democrat in the House, James E. Clyburn will be the leadership liaison to the Appropriations Committee and one of the Democratic Caucus' primary liaisons to the White House. Congressman Clyburn has been a life long champion and has worked diligently

122

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

123

Via E-Mail Michael Li Electricity Policy Specialist U.S. Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 1, 2010 November 1, 2010 Via E-Mail Michael Li Electricity Policy Specialist U.S. Department of Energy Office of Electricity Delivery and Energy Reliability 1000 Independence Avenue, SW Washington, DC 20585 smartgridpolicy@hq.doe.gov Re: Smart Grid RFI: Addressing Policy And Logistical Challenges Dear Mr. Li: On behalf of the Association of Home Appliance Manufacturers (AHAM), I would like to provide our comments on the Smart Grid RFI: Addressing Policy and Logistical Challenges, 75 Fed. Reg. 57,006 (Sept. 17, 2010). The Association of Home Appliance Manufacturers (AHAM) represents manufacturers of major, portable and floor care home appliances, and suppliers to the industry. AHAM's membership includes over 150 companies throughout the world. In the U.S., AHAM members employ tens

124

To whom correspondence should be addressed. Fax: 82-2-886-8516. E-mail: mpsuh@snu.ac.kr.  

E-Print Network (OSTI)

Nandini Swarup MUPP Dec-04 Kristen Hoschouer MUPP May-06 Sonali Tandon MUPP May-06 Benoy Jacob PA-PhD May

Paik Suh, Myunghyun

125

Pre-Bid Attendees First Name Last Name Company Name City State ZIP Code Work Phone E-mail Address  

E-Print Network (OSTI)

Park CA 94025 650-329-8698 evanhughesphd@aol.com Eduardo Saucedo Solera Power Corporation Sacramento CA

126

LiveMail: personalized avatars for mobile entertainment  

Science Conference Proceedings (OSTI)

LiveMail is a prototype system that allows mobile subscribers to communicate using personalized 3D face models created from images taken by their phone cameras. The user takes a snapshot of someone's face - a friend, famous person, themselves, even a ...

Miran Mosmondor; Tomislav Kosutic; Igor S. Pandzic

2005-06-01T23:59:59.000Z

127

HEART SMART NUTRITION Mailout or E-mail Lesson Series  

E-Print Network (OSTI)

HEART SMART NUTRITION Mailout or E-mail Lesson Series MEMORANDUM TO : County Extension Agents Fellow, Professor and Extension Nutrition Specialist SUBJECT: Lesson Series Heart Smart Nutrition Heart. A county-wide Heart Smart seminar would also be another opportunity to sign up participants for the series

128

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 13, 2013 June 13, 2013 PSH-13-0034 - In the Matter of Personnel Security Hearing On June 13, 2013, a Hearing Officer determined that an individual's security clearance should not be restored. In reaching this determination, the Hearing Officer found that the individual had not successfully addressed the DOE's security concerns regarding her finances under criterion (l). June 11, 2013 PSH-13-0019 - In the Matter of Personnel Security On June 11, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's authorization access should be restored. A Local Security Office suspended the individual's security clearance following the individual contemplating suicide and, subsequently, being diagnosed by a DOE consulting psychologist as meeting the criteria for

129

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

130

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

131

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

132

You are where you e-mail: using e-mail data to estimate international migration rates  

Science Conference Proceedings (OSTI)

International migration is one of the major determinants of demographic change. Although efforts to produce comparable statistics are underway, estimates of demographic flows are inexistent, outdated, or largely inconsistent, for most countries. We estimate ... Keywords: demographics, e-mail data, migration, mobility

Emilio Zagheni; Ingmar Weber

2012-06-01T23:59:59.000Z

133

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

134

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

135

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

136

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

137

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

138

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

139

NNSA Administrator Addresses Next Generation of Computational Scientists |  

NLE Websites -- All DOE Office Websites (Extended Search)

Addresses Next Generation of Computational Scientists | Addresses Next Generation of Computational Scientists | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Speeches > NNSA Administrator Addresses Next Generation of Computational ... Speech NNSA Administrator Addresses Next Generation of Computational Scientists Jun 22, 2010

140

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Army Energy Security Considerations  

NLE Websites -- All DOE Office Websites (Extended Search)

ARMY Energy Security ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703)-601-0374 E-mail: don.juhasz@hqda.army.mil FUEL CELL OPPORTUNITIES 26 April 2007 1 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy * * * * FOREIGN OIL 2 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 World Energy Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11% of installations' budget US ARMY IS DEPENDENT ON 1 ¾ ¾ ¾ ¾ ¾ In ¾ 3 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Challenges To Managing The Future World population growing: 6.5 B in 2006, 2030 estimate 7.9 B

142

Argonne Chemical Sciences & Engineering - People - National Security -  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Nuclear Forensics and Nanoscale Engineering Chemical Analysis and Research Analytical Chemistry Laboratory Management and Support David B. Chamberlain, Chemical Engineer and Department Manager phone: 630/252-7699, fax: 630/972-4409, e-mail: david.chamberlain@anl.gov M.S., Chemical Engineering, University of Idaho Spent fuel reprocessing Radiological forensics Sealed radioactive source characterization Radioactive materials and national security Mary Anne Yates, Senior Technical Advisor/Senior Chemist phone: 630/252-7699, fax: 630/972-4409, e-mail: mayates@anl.gov Ph.D., Nuclear Chemistry, Carnegie Mellon University Homeland Security Counterterrorism Publications in nuclear, atomic, and particle physics Jodi L. Canaday, Administrative Secretary

143

The Future of Electric Vehicles and Arizona State University's MAIL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Future of Electric Vehicles and Arizona State University's The Future of Electric Vehicles and Arizona State University's MAIL Battery The Future of Electric Vehicles and Arizona State University's MAIL Battery August 11, 2010 - 4:26pm Addthis Cody Friesen and his team at Arizona State University | Photo Credit Arizona State University Cody Friesen and his team at Arizona State University | Photo Credit Arizona State University Andy Oare Andy Oare Former New Media Strategist, Office of Public Affairs What does this mean for me? EV batteries will have the ability to recharge at least 1000 times at a low cost due to its composition of only domestically-sourced, earth abundant material Electric Vehicles are becoming a reality. Last month, the President got behind the wheel of a Chevy Volt in Michigan, and traveled to Smith

144

Minutes from the March 14, 2013 Printing and Mail Teleconference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 14, 2013 March 14, 2013 Mail discussion Al Majors is on leave today. Ellsworth Howell Jr. and Tony Nellums are sitting for Al. There are no agenda items for the Mail portion. A discussion period for questions, comments, or suggestions was opened without response Printing discussion Discussed suggestions for reducing printing expenses Presidential Executive Order 13589 and reducing hard copy printing in favor of electronic publishing Sec. 5. Printing. Agencies are encouraged to limit the publication and printing of hard copy documents and to presume that information should be provided in an electronic form, whenever practicable, permitted by law, and consistent with applicable records retention requirements. Agencies should consider using acquisition vehicles developed by the

145

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

146

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

147

Department of Energy Releases Strategic Plan to Address Energy Challenges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy Releases Strategic Plan to Address Energy Department of Energy Releases Strategic Plan to Address Energy Challenges Department of Energy Releases Strategic Plan to Address Energy Challenges October 2, 2006 - 9:01am Addthis WASHINGTON, DC - Secretary of Energy Samuel W. Bodman today released the Department's five-year strategic plan that focuses on the Department's role in powering and securing America's future. The plan addresses overall Department goals for developing and deploying new clean energy technologies, reducing our dependence on foreign energy sources, protecting our nuclear weapons stockpile, and ensuring that America remains competitive in the global marketplace. The Department's plan builds on President Bush's Advanced Energy and American Competitiveness Initiatives, which are increasing America's energy security, spurring scientific

148

Security Operations, Laboratory Protection Division, Brookhaven National  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Operations Security Operations Homepage Brookhaven ID Badges, Passes, & Vehicle Stickers Hours of Operation Points of Contact Unclassified Foreign Visits and Assignments: FAQs BNL Site Access Main Gate Access Forms Security Operations L. Butera, Manager Brookhaven National Laboratory Bldg. 50 - P.O. Box 5000 Upton, NY 11973-5000 (631) 344-4691 E-mail: lbutera@bnl.gov Security Operations Mission Statement: To protect DOE special nuclear materials, classified matter, sensitive information, and certain sensitive property against theft, diversion, or destruction; to prevent the sabotage of programs that could result in significant scientific or financial impact; to prevent the malevolent release of hazardous materials including radiological, chemical, and infectious agents or other criminal acts that would endanger employees, the public, and the environment.

149

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

150

Environmental Security and Restoration | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Security & Restoration Environmental Security & Restoration Argonne's work in environmental security and restoration addresses soil, surface water, sediment, and groundwater at contaminated sites. Argonne's work in environmental restoration addresses soil, surface water, sediment, and groundwater at contaminated sites, starting with environmental evaluations and planning projects. Assessments are also conducted of approaches for long-term stewardship of remediated sites with residual contamination. Remedies range from precise excavations to innovative combinations of engineered wetlands and phytoremediation. Argonne researchers conduct approaches for long-term stewardship of remediated sites with residual contamination. The objective of environmental security programs is to support efforts to reduce national

151

2013 Director's New Year Address  

NLE Websites -- All DOE Office Websites (Extended Search)

Director's New Year Address 2013 Director's New Year Address Print Looking Forward and Celebrating 20 Years in 2013 falocne We recently sat down with ALS Director Roger Falcone to...

152

Security of Distributed Data Management  

E-Print Network (OSTI)

Security is a pervasive concept that cannot be decoupled from any distributed systems design. The constraints imposed by security considerations have a profound impact on the overall design of the services and interfaces of any Grid middleware and infrastructure, especially for data management. In this article we discuss the requirements, architecture and design of the security mechanisms that can be put in place for distributed data management. The advantages and disadvantages of different solutions and deployment models are discussed. We illustrate the discussion using the implementation of the EU funded Enabling Grids for E-SciencE (EGEE) project. We direct our focus on the security aspects of data access, data replication, data location and data consistency and how the security requirements of the applications are being addressed in the EGEE middleware stack gLite.

Frohner, A; Brito da Rocha, R; Laure, E

2006-01-01T23:59:59.000Z

153

Internet Dial-In Infodisk E-Mail Diskette Natural Gas Annual,  

Gasoline and Diesel Fuel Update (EIA)

Internet Internet Dial-In Infodisk E-Mail Diskette Natural Gas Annual, 1996 Provides information on supply and disposition of natural gas in the United States. Information is provided nationally, regionally, and by State for 1996. Historical Natural Gas Annual, 1930 through 1996 Contains historical information about supply and disposition of natural gas at the national, regional, and State level, as well as prices at selected points in the flow of gas from wellhead to burnertip. Natural Gas 1996: Issues and Trends Examines how industry restructuring continues to expand choices, and challenges, for industry, participants, and natural gas customers. Natural Gas 1995: Issues and Trends Addresses current issues affecting the natural gas industry and markets, and analyzes trends in the most recent natural gas data. Natural Gas 1994: Issues and Trends Provides an overview of the natural

154

The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms  

E-Print Network (OSTI)

ABSTRACT The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms. (May 2013) Jonathan Stone Department of Maritime Administration Texas A&M University Research Advisor: Dr. Joan Mileski Department of Maritime Administration Prior research has addressed European Union (EU) water transportation policy and its impact on firm strategy. We extend this research by attempting to measure the effect of port security regulation compliance implementation on the perceived competitiveness of maritime firms located in European Union ports. We ask the question: Can firm specific implementation of required port security compliance enhance or hinder a firms competitive advantage? We use Resource-Based Strategic Theory as a framework for evaluating competitiveness. Resource based theory purports that assets and systems can give a firm a competitive advantage if they follow the VRIN criteria of Valuable, Rare, Inimitable, and Not easily substitutable. We ask via email and snail mail survey instrument whether certain security assets, resources and systems are VRIN and whether these assets, resources and systems give competitive advantage to the firm. The type of resources/assets/systems include physical assets such as fencing; ongoing management assets such as communication systems, planning and structuring management assets such as security planning systems; human assets such as employee knowledge; technological assets such as software protection; intangible assets such as a safety culture and financial assets such as cost savings from security compliance. We administer the instrument to all firms operating in EU ports in 2011-2012. A list of firms is obtained from IHSfairplay Ports and Terminals Guide. The results of the survey shows that most managers do not perceive a competitive advantage was gained in the way security assets/resources/management systems were implemented. However, a strong minority 34.12% of managers did perceive competitive advantage was gained from port security compliance where systems/assets/resources were not easily imitated or the I. Furthermore, managers perceive where they were located within the port as an important advantage to security and competitiveness.

Stone, Jonathan Taylor

2013-05-01T23:59:59.000Z

155

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

156

Environmental Security and Restoration [EVS Program Area]  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Security and Restoration Environmental Security and Restoration EVS focuses on environmental and human health aspects of homeland and national security, as well as restoration of sites contaminated with hazardous materials. Contamination in our environment - in air, water, and soil - contributes to health problems and affects the quality of our lives. The EVS Division confronts this challenge by addressing environmental and human health aspects of homeland and national security and by characterizing and restoring sites contaminated with hazardous materials. We integrate extensive expertise in engineering, health physics, hydrogeology, environmental science, chemistry, spatial analysis, database management, and computer programming to contribute to environmental security and restoration.

157

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

158

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

159

The Potential For Miscommunication Using E-Mail As A Source Of Communication  

Science Conference Proceedings (OSTI)

The purpose of this study is to explore inherent characteristics and functional uses of electronic mail (e-mail) that may create the possibility of miscommunication and an impoverished medium for conducting successful personal/social interactions.

Vicki P. Rainey

2000-12-01T23:59:59.000Z

160

Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Southern Company: DOE Smart Grid RFI Addressing Policy and Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges. Southern recognizes that many policy and logistical concerns must be addressed for the promises of smart grid technologies and applications to be fully realized in ways that are beneficial, secure, and cost-effective lor utility customers. Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges More Documents & Publications Re: DOE Request for Information - Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

162

Unsolicited Commercial E-Mail: Empirical Analysis of a Digital Commons  

Science Conference Proceedings (OSTI)

Unsolicited commercial e-mail (UCE) is a significant problem of the digital commons, but there has been little empirical analysis of proposed solutions and underlying mechanisms. This study, based on an analysis of 47 million inbound e-mail messages ... Keywords: Attention Endowment, Box-Jenkins, Common-Pool Resource, Digital Commons, E-Mail Marketing, Exclusion, Is Management, Rival, Spam, Time Series, Unsolicited Commercial E-Mail

Nigel Melville; Aaron Stevens; Robert Plice; Oleg Pavlov

2006-06-01T23:59:59.000Z

163

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

164

Telling the story of older people e-mailing: An ethnographical study  

Science Conference Proceedings (OSTI)

While e-mail is the Internet application most used by older people, very little is known about how they interact with e-mail systems and use them in their daily lives. We undertook a 3-year ethnographical study aimed at revealing and explaining real ... Keywords: Accessibility barriers, E-mail, Ethnography, Interactive experiences, Older people, Real life use

Sergio Sayago; Josep Blat

2010-01-01T23:59:59.000Z

165

T.: Numerical sequence extraction in handwritten incoming mail documents  

E-Print Network (OSTI)

In this communication, we propose a method for the automatic extraction of numerical fields in handwritten documents. The approach exploits the known syntactic structure of the numerical field to extract, combined with a set of contextual morphological features to find the best label to each connected component. Applying an HMM based syntactic analyzer on the overall document allows to localize/extract fields of interest. Reported results on the extraction of zip codes, phone numbers and customer codes from handwritten incoming mail documents demonstrate the interest of the proposed approach. 1.

G. Koch; L. Heutte; T. Paquet

2003-01-01T23:59:59.000Z

166

NIST, DOD, Intelligence Agencies Join Forces to Secure US ...  

Science Conference Proceedings (OSTI)

... The updated security controlsmany addressing advanced ... from databases of known cyber attacks and ... SP 800-37, which will transform the current ...

2011-03-24T23:59:59.000Z

167

NIST Issues Major Revision of Core Computer Security Guide ...  

Science Conference Proceedings (OSTI)

... State-of-the-practice security controls and control enhancements have been integrated into the new revision to address the evolving technology ...

2013-05-01T23:59:59.000Z

168

FAQS Reference Guide Safeguards and Security General Technical Base  

Energy.gov (U.S. Department of Energy (DOE))

This reference guide addresses the competency statements in the July 2009 edition of DOE-STD-1123-2009, Safeguards and Security General Technical Base Qualification Standard.

169

Introduction SCADA Security for Managers and Operators | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA...

170

Securing WLANs using 802.11i | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

addresses design principles and best practices regarding the secure implementation and operation of Wireless LAN (WLAN) communication networks based on the IEEE 802.11 protocol....

171

Research Addressing Power Plant Water  

NLE Websites -- All DOE Office Websites (Extended Search)

Addressing Power Plant Water Management to Minimize Water Use while Providing Reliable Electricity Generation Water and Energy 2 Water and Energy are inextricably linked. Because...

172

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

173

T-599: Microsoft April 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

99: Microsoft April 2011 Security Bulletin Release 99: Microsoft April 2011 Security Bulletin Release T-599: Microsoft April 2011 Security Bulletin Release April 11, 2011 - 5:24am Addthis PROBLEM: Microsoft April 2011 Security Bulletin Release PLATFORM: Microsoft Windows, Microsoft Office, Microsoft Server Software, and Microsoft Developer Tools and Software ABSTRACT: Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. reference LINKS: Microsoft Security Bulletin Advance Notification for April 2011 Microsoft Security April Affected Software TechNet Webcast: Information About Microsoft April Security Bulletins IMPACT ASSESSMENT: High Discussion:

174

Advanced Metering Infrastructure Security Objects  

Science Conference Proceedings (OSTI)

With the widespread deployment of large-scale Advanced Metering Infrastructure (AMI) systems, utilities must address the task of managing the alarms and events that are generated by the meters. However, AMI systems do not easily integrate into Security Information and Event Management (SIEM) systems and Intrusion Detection Systems (IDSs) due to the fact that AMI vendors do not use standard data objects for representing the alarms and events that are generated by the meters. This project addresses ...

2012-12-28T23:59:59.000Z

175

Privacy Act Requests | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

be your full name, any other names you might have used, your birth date, your social security number, and home address. Please provide a phone number where you can be reached...

176

Proposed Comprehensive Cyber Security Legislation, May 2011  

Science Conference Proceedings (OSTI)

The role of cyber security in the critical infrastructures of the United States has been recognized by the President and by members of Congress. To address potential cyber security threats and vulnerabilities, the Senate has proposed revisions to specific laws and regulations. This white paper includes a technical assessment of some of the key proposed revisions.

2011-10-26T23:59:59.000Z

177

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

178

Secretary Chu Announces Latest Efforts to Address Cybersecurity |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Latest Efforts to Address Cybersecurity Latest Efforts to Address Cybersecurity Secretary Chu Announces Latest Efforts to Address Cybersecurity September 23, 2010 - 12:00am Addthis Washington, D.C. - Speaking at the inaugural GridWise Global Forum, U.S. Energy Secretary Steven Chu today announced the investment of more than $30 million for ten projects that will address cybersecurity issues facing the nation's electric grid. Together, these projects represent a significant investment in addressing cybersecurity issues in the nation's electric infrastructure. Today's announcement supports the Administration's goal of building a 21st Century clean energy economy supported by a secure, reliable, electricity system delivering power to American homes and businesses. "These awards help us make a significant leap forward to strengthen the

179

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

180

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

182

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

183

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

184

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

185

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

186

Addressing the Need for Independence in the CSE Model  

SciTech Connect

Abstract Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. Risk assessment is the widely accepted process used to understand, quantify, and document the effects of undesirable events on organizational objectives so that risk management, continuity of operations planning, and contingency planning can be performed. One technique, the Cyberspace Security Econometrics System (CSES), is a methodology for estimating security costs to stakeholders as a function of possible risk postures. In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain, as a result of security breakdowns. Additional work has applied CSES to specific business cases. The current state-of-the-art of CSES addresses independent events. In typical usage, analysts create matrices that capture their expert opinion, and then use those matrices to quantify costs to stakeholders. This expansion generalizes CSES to the common real-world case where events may be dependent.

Abercrombie, Robert K [ORNL; Ferragut, Erik M [ORNL; Sheldon, Frederick T [ORNL; Grimaila, Michael R [ORNL

2011-01-01T23:59:59.000Z

187

Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses  

E-Print Network (OSTI)

We propose a model of operation for next generation wireless Internet, in which a mobile host has hundreds of "disposable" Mobile IPv6 home addresses. Each correspondent is distributed a different disposable home address. If attacked on a given home address, the mobile user can block packets to that address and become unreachable to the attacker. Blocking one address does not affect other addresses. Other correspondents can still reach the mobile host. A new home address can also be requested via e-mail, instant messaging, or directly from the target host using a protocol that we develop. This model is especially useful against battery exhausting Denial-of-Service (DoS) attacks and CPU exhausting distributed DoS attacks, since it seems to be the only viable solution, currently. We show however that this model can also be used to defeat other attacks and also to stop spam.

Mutaf, Pars

2011-01-01T23:59:59.000Z

188

A survey of security in multi-agent systems  

Science Conference Proceedings (OSTI)

Multi-agent systems (MAS) are a relatively new software paradigm that is being widely accepted in several application domains to address large and complex tasks. However, with the use of MAS in open, distributed and heterogeneous applications, the security ... Keywords: Agents, Multi-agent systems, Multi-agents, Security, Security in MAS

Rodolfo Carneiro Cavalcante; Ig Ibert Bittencourt; Alan Pedro da Silva; Marlos Silva; Evandro Costa; Robrio Santos

2012-04-01T23:59:59.000Z

189

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

190

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

191

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

192

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

193

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

194

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

195

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

196

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

197

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

198

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

199

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

200

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

202

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

203

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Ruby Mail Gem Directory Traversal and Shell Command 57: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities April 27, 2012 - 7:00am Addthis PROBLEM: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities PLATFORM: Mail gem for Ruby 2.x ABSTRACT: Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system. Reference Links: Secunia Advisory SA48970 CVE-2012-2139 CVE-2012-2140 IMPACT ASSESSMENT: Medium Discussion: Input passed via the "to" parameter within the file delivery method is not properly verified before being used and can be exploited to modify arbitrary files via directory traversal attacks. Certain input passed to

204

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

205

Neile Miller addresses DOE/NNSA intergovernmental meeting | National  

National Nuclear Security Administration (NNSA)

Neile Miller addresses DOE/NNSA intergovernmental meeting | National Neile Miller addresses DOE/NNSA intergovernmental meeting | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Neile Miller addresses DOE/NNSA intergovernmental meeting Neile Miller addresses DOE/NNSA intergovernmental meeting Posted By Office of Public Affairs NNSA Blog

206

Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Smart Grid RFI: Addressing Policy and Logistical Challenges. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. The Alliance to Save Energy is a coalition of prominent business, government, environmental, and consumer leaders who promote the efficient use of energy worldwide to benefit consumers, the environment, economy, and national security. The Alliance to Save Energy (the Alliance) thanks the Department of Energy for the opportunity to comment on broad issues of policy and logistical challenges faced in smart grid implementation. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. More Documents & Publications

207

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

208

Title: Address: Type of report:  

E-Print Network (OSTI)

To explore options for reducing greenhouse gas emissions from freight transport Environment Recommendation to the Australian Transport Council by July 2009. This report discusses the key issues for addressing growing greenhouse gas emissions from freight transport. The report proposes actions for managing and reducing greenhouse gas emissions from freight transport over the longer term. For public consultation Climate change, greenhouse gas emissions, freight transport.

Key Milestones; Key Words

2008-01-01T23:59:59.000Z

209

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

210

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

211

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

212

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

213

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

214

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

215

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

216

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

217

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

218

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

219

Addressing Energy Demand through Demand Response: International...  

NLE Websites -- All DOE Office Websites (Extended Search)

Addressing Energy Demand through Demand Response: International Experiences and Practices Title Addressing Energy Demand through Demand Response: International Experiences and...

220

Research Projects Addressing Technical Challenges to Environmentally...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Research Projects Addressing Technical Challenges to Environmentally Acceptable Shale Gas Development Selected by DOE Research Projects Addressing Technical Challenges to...

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Headquarters_Security_Overview_Handbook_March_2012  

NLE Websites -- All DOE Office Websites (Extended Search)

H H H E E A A D D Q Q U U A A R R T T E E R R S S S S E E C C U U R R I I T T Y Y O O V V E E R R V V I I E E W W H H A A N N D D B B O O O O K K November 2012 UNITED STATES DEPARTMENT OF ENERGY Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations Phone: 301-903-9990 Fax: 301-903-4601 E-mail: HS-92Operations@hq.doe.gov 1 Table of Contents Making a Difference 2 Introduction 2 Responsibilities 2 Headquarters Protective Force (PF) 2 Headquarters Security Officers (HSOs) 2 Headquarters Security Procedures 3-5 Classified Matter Protection and Control 5-8 A Final Word 8 Emergency Telephone Numbers 9 Reminders 9 2 MAKING A DIFFERENCE

222

Control Systems Security Test Center - FY 2004 Program Summary  

Science Conference Proceedings (OSTI)

In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nations critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

Robert E. Polk; Alen M. Snyder

2005-04-01T23:59:59.000Z

223

The EMA system: a CTI based e-mail alerting service  

Science Conference Proceedings (OSTI)

The integration of Internet services and telephony services is a new area for the development of telecommunications services. One example is an e-mail alerting service that uses the telephony network for e-mail notification. The EMA system is a computer ...

D. Frank; H. Lucic; M. Opsenica; L. Puksec; M. Zic; S. Brajkovic; V. Maricic

2000-02-01T23:59:59.000Z

224

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

225

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

226

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

227

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

228

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

229

Customer Feedback during Development of 1998 MECS: Mail/Electronic Survey  

U.S. Energy Information Administration (EIA) Indexed Site

1998 MECS User Needs 1998 MECS User Needs Mail/Electronic Survey Results A mail/electronic survey was conducted as part of the process to collect information on the data needs of MECS customers. The collection time frame was May 1 through July 31, 1998. The survey portion has been completed, and the total results are now available. During this three-month period, the electronic user-needs survey received about 207 hits. Yet, only 15 of those hits resulted in the transmission of a completed survey. Exactly 239 surveys were mailed to customers on the mailing list of the MECS publication. A total of 50 completed surveys (21% response rate) were returned, 32 of which resulted from a follow-up mail request. Only two surveys were returned by the 11 trade associations that were identified as MECS users. Where appropriate, the replies of those two TRADE

230

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

231

Alternative Fuels Data Center: Energy Independence and Security Act of 2007  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Independence Independence and Security Act of 2007 (P.L. 110-140) to someone by E-mail Share Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Facebook Tweet about Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Twitter Bookmark Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Google Bookmark Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Delicious Rank Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Digg Find More places to share Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on AddThis.com... More in this section...

232

NPDES Individual Permit for Industrial Facilities - Mail Merge Template  

NLE Websites -- All DOE Office Websites (Extended Search)

No. TN0002968 No. TN0002968 Authorization to discharge under the National Pollutant Discharge Elimination System (NPDES) Issued By Tennessee Department of Environment and Conservation Division of Water Pollution Control 401 Church Street 6th Floor, L & C Annex Nashville, Tennessee 37243-1534 Under authority of the Tennessee Water Quality Control Act of 1977 (T.C.A. 69-3-101 et seq.) and the delegation of authority from the United States Environmental Protection Agency under the Federal Water Pollution Control Act, as amended by the Clean Water Act of 1977 (33 U.S.C. 1251, et seq.) Discharger: USDOE-Oak Ridge Y12 National Security Complex is authorized to discharge: process wastewaters and other wastewaters which have been accepted for treatment via waste acceptance procedures, cooling

233

Cursive script postal address recognition  

E-Print Network (OSTI)

Large variations in writing styles and di culty in segmenting cursive words are the main reasons for cursive script postal address recognition being a challenging task. A scheme for locating and recognizing words based on over-segmentation followed by dynamic programming is proposed. This technique is being used for zip code extraction as well as city-state recognition in our system. Results have been reported based on cursive script images from the United States Postal Service(USPS) database. An overview of the cursive script postal address recognition system under development at the IBM Almaden Research Center, is presented. Optical Character Recognition(OCR) systems are usually trained to minimize character level errors, which does not necessarily guarantee the best results for word level recognition. Ascheme for combining character-level optimized classi ers, using a word-level optimization function, to achieve higher word level recognition rates is proposed. The optimum values for the parameters of the combination function are obtained using the gradient descent method. Improvements in word recognition rates on the USPS database by using word-level optimized ensembles of classi ers are reported. To My Family iii

Prasun Sinha; Prasun Sinha

1997-01-01T23:59:59.000Z

234

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

235

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

236

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

237

arXiv.org - No mailings or Database updates for June 21 and 22  

NLE Websites -- All DOE Office Websites (Extended Search)

will participate in an intensive review of personal responsibility for security, counterintelligence and cyber-security. While xxx.lanl.gov is in the open laboratory network...

238

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

239

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

240

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

242

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

243

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

244

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

245

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

246

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

247

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

248

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

249

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

250

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

251

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

252

Rebecca Peterson VIA U.S. Mail and E-mail: U.S. Department of Energy ERS2014@eia.gov  

Gasoline and Diesel Fuel Update (EIA)

May 6, 2013 May 6, 2013 Rebecca Peterson VIA U.S. Mail and E-mail: U.S. Department of Energy ERS2014@eia.gov U.S. Energy Information Administration Rebecca.Patterson@eia.doe.gov Mail Stop EI-23, Forrestal Building 1000 Independence Avenue SW Washington, D.C. 20585 Re: Comments on Form EIA-930 Dear Ms. Peterson: Alaska Electric Light and Power (AEL&P), the electric utility serving Juneau, Alaska, offers these comments on the proposed implementation of Form EIA-930 "Balancing Authority Operations Report." (a) whether the proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the information shall have practical utility. AEL&P is a small, electrically isolated utility. AEL&P generates,

253

Climate-derived tensions in Arctic security.  

Science Conference Proceedings (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

254

Recommended Practice for Securing Control System Modems  

SciTech Connect

This paper addresses an often overlooked backdoor into critical infrastructure control systems created by modem connections. A modems connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

James R. Davidson; Jason L. Wright

2008-01-01T23:59:59.000Z

255

PSH-12-0076 - Personnel Security Hearing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 - Personnel Security Hearing 6 - Personnel Security Hearing PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted . A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's falsification and financial irresponsibility. His behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the requisite element of "deliberateness" was met under Criterion F. She further found that

256

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

257

Computer Model Addresses Softening Steel Problem  

Science Conference Proceedings (OSTI)

Apr 22, 2013 ... ARPA-E Awards EV Energy Storage Projects. ... too hard to meet nuclear weapon requirements at National Nuclear Security Administration's...

258

July 27 Stakeholder Meeting Addresses Cybersecurity and ...  

Science Conference Proceedings (OSTI)

... Private-sector panelists include Vint Cerf, Google; Larry Clinton, Internet Security Alliance; and James Lewis, Center for Strategic and International ...

2010-10-05T23:59:59.000Z

259

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

260

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Science Conference Proceedings (OSTI)

Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratorys (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

262

Transportation Security Review Program and Radiofrequency Identification (RFID) Technology Applications for Hazardous Materials  

Science Conference Proceedings (OSTI)

EPRI formed a Transportation Security Implementation Working Group in response to regulatory requirements to review Carrier Transportation Security Plans, and to address rapidly changing or new transportation security rules. This group, working in collaboration with the Nuclear Energy Institute (NEI) Transportation Task Force, develops and implements transportation security programs with broad application across the industry, such as a Transportation Security Review program for carriers. This report docu...

2004-11-05T23:59:59.000Z

263

Summary of the 2013 EPRI/NATF Industry Summit on Physical Security of Transmission Assets  

Science Conference Proceedings (OSTI)

Compromises to power system physical security can cause long-term outages, which can adversely impact the economy, the environment, public safety, and national security. Such compromises could cost utilities, and ultimately society, billions of dollars. Recent physical security incidents have heightened awareness of the need for greater emphasis on the physical security of substations and transmission facilities. To begin a collaborative process of addressing physical security threats, EPRI and the ...

2013-11-26T23:59:59.000Z

264

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

265

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

266

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

267

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

268

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

269

E-Mail Client and Mobile Device Configuration Changes for Exchange...  

NLE Websites -- All DOE Office Websites (Extended Search)

coming in When notification is received, restart Outlook. Outlook 2010, cached mode disabled 14.0.6112.5000 Connection lost; cannot log in to view existing mail Reopen Outlook....

270

emergency.pppl.gov Join Our Mailing List A Collaborative National Center for Fusion & Plasma Research  

E-Print Network (OSTI)

emergency.pppl.gov Join Our Mailing List A Collaborative National Center for Fusion & Plasma Research Search News Room News Archive American Fusion News Press Releases Publications Princeton Journal

271

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

272

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

273

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

274

NIST SP 800-100, Information Security Handbook: A Guide for ...  

Science Conference Proceedings (OSTI)

... The handbook is therefore useful to any manager who requires a ... Agency information security policy should address the fundamentals of agency ...

2013-06-11T23:59:59.000Z

275

Physical Security System Sensitivity to DBT Perturbations  

E-Print Network (OSTI)

This thesis examines how perturbing selected adversary capabilities in a design basis threat (DBT) may affect the assessment of a facility's security system performance. We found that using a strictly defined DBT to design and analytically test facility security systems can lead to invalid assessments that security measures are meeting standards. Design Basis Threats are intended to represent the most severe yet realistic attack a facility might face. However, the static nature of the standard DBT makes it unable to test the performance of a facility security system in the case where a specialized adversary may possess different capabilities than defined in the DBT. Our analysis of security system performance for various modeled facilities revealed significant vulnerabilities to certain perturbations of adversary capabilities. These vulnerabilities went undetected when the original strictly defined graded DBT was used in the assessment procedure. By maximizing one adversary capability at the expense of others, a specialized adversary force was able to efficiently defeat each facility. To address this problem, we proposed employing a so-called "point-based" DBT as an alternative to the existing strictly defined DBT. In a point-based DBT, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities will outweigh the additional cost of generating a point-based DBT, especially if the vulnerabilities are identified during the initial design of the security system.

Conchewski, Curtis

2012-08-01T23:59:59.000Z

276

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

277

Independent Oversight Inspection, Office of Secure Transportation - March  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection, Office of Secure Transportation - Inspection, Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the Office of Secure Transportation The Secretary of Energy's Office of Independent Oversight, within the Office of Health, Safety and Security, conducted an inspection of the emergency management program at the Office of Secure Transportation (OST) in January and February 2007. The inspection was performed by the Office of Emergency Management Oversight. This 2007 inspection found that, in general, OST efforts have been effective in addressing weaknesses in field response; however, some corrective actions were either ineffective or did not fully address elements of the program, particularly those that affect the EOC cadre. A

278

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

279

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

280

Strategic Insights on Security, Quality, Reliability, and Availability  

Science Conference Proceedings (OSTI)

This report provides security criteria and performance metrics for assessing the electric power system. It is part of a larger project on the strategy for managing security, quality, reliability, and availability (SQRA) performance of electric power systems. The main focus of this update is measurement of the security component. It also addresses emerging North American Electric Reliability Council (NERC) operating and planning standards and their roles in managing SQRA performance. This report is intend...

2005-03-31T23:59:59.000Z

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Challenges. Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. The Alliance to Save Energy is a coalition of prominent business, government, environmental, and consumer leaders who promote the efficient use of energy worldwide to benefit consumers, the environment, economy, and national security. The Alliance to Save Energy (the Alliance) thanks the Department of Energy for the opportunity to comment on broad issues of policy and logistical challenges faced in smart grid implementation. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. More Documents & Publications DC OPC Comments. September 17, 2010 Comments of the National Rural Electric Cooperative Association, Request

282

Homeland Security Issues for Facilities  

E-Print Network (OSTI)

The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure and systems. After assessments are complete, the results should be compared with guidelines and recommendations produced by government agencies or professional organizations. Areas to address to enhance security and safety include ventilation, control systems, air filtration, alarm systems, building access, and surveillance. This paper will look at the objectives of task forces, sources of information, and measures owners can take in schools and other facilities. Although actions involving increased awareness, structural reinforcement, and emergency water supplies are important, this discussion will focus on mechanical and security systems and related items. The authors' experiences in assisting Texas school districts will also be shared.

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

283

Information Security Management Handbook, Volume 1, 6th edition  

Science Conference Proceedings (OSTI)

Promoting the view that the management, ethics, and values of an organization leads directly to its information security program, this guide addresses up-to-date issues in this increasingly important area.

Harold F. Tipton; Micki Krause

2007-02-01T23:59:59.000Z

284

NREL: Vehicles and Fuels Research - Secure Transportation Data...  

NLE Websites -- All DOE Office Websites (Extended Search)

NREL is addressing the data-privacy issue by providing the Transportation Secure Data Center (TSDC) to house this rich data for continued and expanded research. The TSDC will...

285

ESF: an efficient security framework for wireless sensor network  

Science Conference Proceedings (OSTI)

A wireless sensor network WSN consists of a large number of resource constrained sensor nodes, usually deployed in hostile environments, where they face a variety of malicious attacks. To address the security vulnerabilities in WSN, this paper proposes ...

Somanath Tripathy

2013-02-01T23:59:59.000Z

286

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

287

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

288

Assessing the Security of a Clean-Slate Internet Architecture  

E-Print Network (OSTI)

Assessing the Security of a Clean-Slate Internet Architecture Gowtham Boddapati John Day Ibrahim Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate a comprehensive approach to security. Most recently, there have been attempts to design clean- slate internet

Texas at Arlington, University of

289

Security in grid computing: A review and synthesis  

Science Conference Proceedings (OSTI)

This paper provides an extensive survey of the different methods of addressing security issues in the grid computing environment, and specifically contributes to the research environment by developing a comprehensive framework for classification of these ... Keywords: Grid computing, Information assurance, Security, Survey and synthesis

Erin Cody; Raj Sharman; Raghav H. Rao; Shambhu Upadhyaya

2008-03-01T23:59:59.000Z

290

An analysis of security threats to mobile IPv6  

Science Conference Proceedings (OSTI)

In parallel with the design of IPv6, several protocol extensions for mobility support of IPv6 nodes have been proposed and these continue to evolve. However, a variety of security threats arise and these have to be taken in to account in the design of ... Keywords: CGA, MIPv6, binding update attacks, care-of address tests, cryptographically generated addresses, flooding attacks, home tests, internet protocol, mobile IPv6, replay attacks, return routability, security threats, triangular routing

Michael Durr; Ray Hunt

2008-09-01T23:59:59.000Z

291

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

292

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

293

U-051: Skype Discloses IP Addresses to Remote Users | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51: Skype Discloses IP Addresses to Remote Users 51: Skype Discloses IP Addresses to Remote Users U-051: Skype Discloses IP Addresses to Remote Users December 5, 2011 - 7:00am Addthis PROBLEM: A remote user can determine the IP address of a Skype user. PLATFORM: Skype application ABSTRACT: Skype Discloses IP Addresses to Remote Users reference LINKS: SecurityTracker Alert ID: 1026370 Forbes: Skype Flaw IMPACT ASSESSMENT: High Discussion: A remote user can initiate a Skype call to a target user to determine the target user's IP address and then terminate the call before the target user's Skype application has indicated an incoming call. The remote user does not need to be on the target user's contact list. Armed with an IP address, hackers can uncover specific information about victims, including who they chat with, what they download while online, and

294

T-533: Microsoft January 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft January 2011 Security Bulletin Release 3: Microsoft January 2011 Security Bulletin Release T-533: Microsoft January 2011 Security Bulletin Release January 12, 2011 - 2:25pm Addthis PROBLEM: Microsoft January 2011 Security Bulletin Release PLATFORM: Various Windows OS Platforms, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 ABSTRACT: Microsoft released 2 bulletins to address 3 vulnerabilities involving Microsoft Windows and components in Windows OS, and Windows Server Releases. Only 1 of these bulletins get our maximum severity rating of Critical. reference LINKS: Microsoft Security Bulletin Advance Notification for December 2010 TechNet Webcast: Information About Microsoft January 2011 Security Bulletins Discussion: Microsoft Security Bulletin MS11-001 - Important CVE-2010-3145 - This

295

Recommended Practice for Securing Control System Modems | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Practice for Securing Control System Modems Practice for Securing Control System Modems Recommended Practice for Securing Control System Modems This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. Recommended Practice for Securing Control System Modems More Documents & Publications

296

Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues  

SciTech Connect

This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nations current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

Wayne F. Boyer; Scott A. McBride

2009-04-01T23:59:59.000Z

297

* Corresponding author. Tel.: #852-2788-7831; fax: #852-2788-7830. E-mail address: peter.yu@cityu.edu.hk (K.N. Yu)  

E-Print Network (OSTI)

lightweight concrete in the building industry (Yu, Guan, Liu, Young, 0265-931X/99/$- see front matter 1999 materials were wall paper, plaster, ceramic mosaics and glazed ceramic. It was found that some covering

Yu, K.N.

298

*Email: kammen@berkeley.edu, Telephone: (510) 642-1640, Fax: (510) 642-1085, Mailing Address: 310 Barrows Hall, University of California, Berkeley, CA 94720, USA  

E-Print Network (OSTI)

fuels. Retail electricity rates in the Caribbean average 0.35 US$/kWh (CARILEC, 2010), finding) (Weisser, 2004b). #12;2 Figure 1 Domestic Retail Electricity Rates in Caribbean Islands (CARILEC, 2010 in a broader historical framework of energy sector development, indicating a few policy lessons. We find

Kammen, Daniel M.

299

* Corresponding author. Tel.:##44-117-928-4418; fax:##44-117-E-mail address: K.Jandt@bris.ac.uk (K.D. Jandt).  

E-Print Network (OSTI)

for curing light-activated dental materials [6]. Rather than a hot "lament as used in halogen bulbs, LEDs use.Jandt@bris.ac.uk (K.D. Jandt). Biomaterials 21 (2000) 1379}1385 Light-emitting diode (LED) polymerisation of dental performance of light polymerised dental composites is greatly in#uenced by the quality of the light

Ashworth, Stephen H.

300

*Corresponding author. Tel.: #1 505 667 5876. E-mail address: cy@lanl.gov (C.M. Ho!man).  

E-Print Network (OSTI)

"ed. Straps sewn into the cover can be tight- ened to take up the slack in the cover when the pond is full with wet sand. Each "lled 2.8 m- long pipe weighed &35 kg. On the sides of the pond, only the pipes going up the sides were "lled with sand, as the unsupported horizontal cross pieces would sag if they were

California at Santa Cruz, University of

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

* Corresponding author. Tel.: #1-512-471-7230; fax: #1-512-471-E-mail addresses: sbishnoi@che.utexas.edu (S. Bishnoi), rochelle@  

E-Print Network (OSTI)

Bishnoi, Gary T. Rochelle* Department of Chemical Engineering, The University of Texas at Austin, Austin with an activation energy of 3.36;10 kJ/kmol. Solubility in 0.6 M PZ was measured by bracketing absorption of absorption is seen in the absorber while a low energy of regeneration is required in the stripper. One

Rochelle, Gary T.

302

* Corresponding author. Tel.: #1-516-344-2830; fax: #1-516-344-E-mail address: vmf@bnl.gov (V.M. Fthenakis).  

E-Print Network (OSTI)

, Brookhaven National Laboratory, P.O. Box 5000, Upton, NY 11973-5000, USA Received 25 May 2000 Abstract not only can help meet the growing worldwide demand for electricity, but it can do so without incurring

303

* Corresponding author. Tel.: #852-2788-7812; fax: #852-2788-7830. E-mail address: peter.yu@cityu.edu.hk (K.N. Yu)  

E-Print Network (OSTI)

. Radiological Assessment: A Textbook on Environmental Dose Analysis. NUREG/CR-3332. U.S. Nu- clear Regulatory

Yu, K.N.

304

The IAEA Assistance and Training Programme for Transport Security  

Science Conference Proceedings (OSTI)

The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

2010-01-01T23:59:59.000Z

305

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

306

Advanced Routing Worm and Its Security Challenges  

Science Conference Proceedings (OSTI)

Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected vulnerable computers by scanning the entire IPv4 address space. In this article, the authors present an advanced worm called the "routing worm," which implements two new ... Keywords: Network security, modeling, routing worm

Cliff C. Zou; Don Towsley; Weibo Gong; Songlin Cai

2006-01-01T23:59:59.000Z

307

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

308

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

309

Los Alamos National Laboratory Advancing National Security Through Scientific  

NLE Websites -- All DOE Office Websites (Extended Search)

Scientific Scientific Inquiry LANL is a key player in energy security | pg. 14 In this Issue Take a look at LANL's visualization environment | pg. 20 October 2010 LANL is operated by Los Alamos National Security, LLC for the U.S. Department of Energy's National Nuclear Security Administration Editors: Barbara Mack and Jeff Berger Art Direction: Cisneros Design Produced by the Communications Office of Los Alamos National Laboratory E-mail: why@lanl.gov Printed on recycled paper LALP-10-054 About this magazine Why magazine is a new publication primarily for employees and retirees of Los Alamos National Laboratory. The Lab will publish Why four times a year and develop for it an online presence. This periodical is named for the crucial nature of scientific inquiry at Los Alamos

310

U.S. Energy Secretary Addresses International Atomic Energy Agency General  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Energy Secretary Addresses International Atomic Energy Agency U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference September 19, 2011 - 2:24pm Addthis VIENNA, AUSTRIA - U.S. Energy Secretary Steven Chu addressed the International Atomic Energy Agency's General Conference today in Vienna. Opening with a message from President Barack Obama, Secretary Chu highlighted the importance of safety and security in the nuclear industry in light of the tragic events at Fukushima this year, and outlined the four priorities of President Obama's nuclear agenda: promoting the peaceful use of nuclear energy, strengthening the nuclear proliferation regime, pursuing nuclear disarmament and enhancing nuclear security The following are excerpts of Secretary Chu's remarks as prepared for

311

U.S. Energy Secretary Addresses International Atomic Energy Agency General  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Secretary Addresses International Atomic Energy Agency Secretary Addresses International Atomic Energy Agency General Conference U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference September 19, 2011 - 4:48pm Addthis VIENNA, AUSTRIA - U.S. Energy Secretary Steven Chu addressed the International Atomic Energy Agency's General Conference today in Vienna. Opening with a message from President Barack Obama, Secretary Chu highlighted the importance of safety and security in the nuclear industry in light of the tragic events at Fukushima this year, and outlined the four priorities of President Obama's nuclear agenda: promoting the peaceful use of nuclear energy, strengthening the nuclear proliferation regime, pursuing nuclear disarmament and enhancing nuclear security The following are excerpts of Secretary Chu's remarks as prepared for

312

Oklahoma State University -106 Whitehurst, Stillwater, Oklahoma 74078 (405) 744-5449 NAME AND ADDRESS CHANGE  

E-Print Network (OSTI)

- 6365. TIAA-CREF Retirement: To change your address with TIAA-CREF, use the TIAA-CREF Change of Address form found at http://hr.okstate.edu. Send the forms to TIAA-CREF, 730 3rd Avenue, New York, NY 10017-3206. To change your name, contact TIAA-CREF at (800) 842-2776. They will need your social security number, your

Veiga, Pedro Manuel Barbosa

313

Public key infrastructure for DOE security research  

SciTech Connect

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

314

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

315

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

316

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

317

Addressing Energy Demand through Demand Response: International...  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Demand through Demand Response: International Experiences and Practices Title Addressing Energy Demand through Demand Response: International Experiences and Practices...

318

Reducing code size through address register assignment  

Science Conference Proceedings (OSTI)

In DSP processors, minimizing the amount of address calculations is critical for reducing code size and improving performance, since studies of programs have shown that instructions that manipulate address registers constitute a significant portion of ... Keywords: DSP, Software compilation, address registers, register assignment

G. Chen; M. Kandemir; M. J. Irwin; J. Ramanujam

2006-02-01T23:59:59.000Z

319

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

320

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Circuits of power in creating de jure standards: shaping an international information systems security standard  

Science Conference Proceedings (OSTI)

This paper addresses the role of power and politics in setting standards. It examines the interaction of external contingencies, powerful agents, resources, meaning, and membership of relevant social and institutional groupings in generating successful ... Keywords: information systems security management, information systems security standards, institutionalization, power and politics, security management code of practice

James Backhouse; Carol W. Hsu; Leiser Silva

2006-08-01T23:59:59.000Z

322

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

323

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

324

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

325

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

327

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

328

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

329

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

330

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

331

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

332

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

333

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

334

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

335

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

336

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

337

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

338

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

339

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

340

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

342

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

343

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

344

NNSA PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION  

NLE Websites -- All DOE Office Websites (Extended Search)

PERSONNEL SECURITY PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION Contractor Federal Name (Last, First, Middle): Suffix: Date of Birth: Social Security Number: Place of Birth (city and state/country): Citizenship(s): Email Address: Employer (legal name): Job Title: Required: LOCATION/BILLING Work Location: Contracting Office Location/SON: Prime Contract Number: Sub-contract Number: Facility Code: Employer Code: Required: CLEARANCE ACTION Requested Action(s): Clearance Level: (for employer/contract above) Clearance History Never held a clearance Previously held Currently holds Key Management Personnel (KMP)? Human Reliability Program (HRP)? PERSONNEL SECURITY USE ONLY: DOE Clearance: Special Access Program (SAP)? Yes No CLEARANCE JUSTIFICATION NARRATIVE

345

Los Alamos CCS (Center for Computer Security) formal computer security model  

SciTech Connect

This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

346

Nevada National Security Site Wraps Up 2013 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Security Site Wraps Up 2013 National Security Site Wraps Up 2013 Nevada National Security Site Wraps Up 2013 December 24, 2013 - 12:00pm Addthis A specialist with the Nevada National Security Site groundwater characterization team collects a groundwater sample at well PM-3 located on the Nevada Test and Training Range, which is Air Force controlled land surrounding the NNSS. Groundwater characterization activities address the impacts of historic nuclear testing on groundwater. A specialist with the Nevada National Security Site groundwater characterization team collects a groundwater sample at well PM-3 located on the Nevada Test and Training Range, which is Air Force controlled land surrounding the NNSS. Groundwater characterization activities address the impacts of historic nuclear testing on groundwater.

347

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

348

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

349

National Nuclear Security Administration Nevada Site Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

93-851 8 93-851 8 JAM 1 4 2010 Scott Blake Harris, General Counsel, DOEiHQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL PLANNING SUMMARY Pursuant to DOE Order 451. IB, NEPA Compliance Program, NNSA/NSO is pleased to provide the enclosed Annual NEPA Planning Summary. The document provides a brief description of ongoing and planned NEPA actions for calendar year 201 0. If there are any questions regarding this summary, please contact our NEPA Compliance Officer, Linda M. Cohn, at (702) 295-0077. s r4/(&~1/:~d Stephen A. Mellington Enclosure: As stated cc wtencl. via e-mail: C. M. Borgstrom, DOEiHQ (GC-54) FORS B. A. Costner, DOEiHQ (GC-54) FORS M. E. Martin, NNSAIHQ (NA-56) FORS

350

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

351

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

352

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

353

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... PIV Cards, which are available for purchase as a NIST Special Database. ... password is received, the mail list archive is available at http://cio.nist.gov ...

354

Microgrid cyber security reference architecture.  

SciTech Connect

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

355

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

356

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

357

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

358

U-057: Microsoft Security Bulletin Advance Notification for December 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Microsoft Security Bulletin Advance Notification for 57: Microsoft Security Bulletin Advance Notification for December 2011 U-057: Microsoft Security Bulletin Advance Notification for December 2011 December 9, 2011 - 12:00pm Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2011. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada).

359

T-584: Microsoft March 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Microsoft March 2011 Security Bulletin Release 84: Microsoft March 2011 Security Bulletin Release T-584: Microsoft March 2011 Security Bulletin Release March 21, 2011 - 4:25pm Addthis PROBLEM: Microsoft March 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms.(Affected Software and Download Locations) ABSTRACT: Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: Microsoft Security Bulletin Summary for March 2011 Microsoft Technical Security Notifications

360

U-078: Microsoft Security Bulletin Advance Notification for January 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

78: Microsoft Security Bulletin Advance Notification for January 78: Microsoft Security Bulletin Advance Notification for January 2012 U-078: Microsoft Security Bulletin Advance Notification for January 2012 January 10, 2012 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2012. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for January 2012. Microsoft has posted 1 Critical Bulletins and 6 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on January 11, 2012, at 11:00 AM Pacific Time (US & Canada).

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

T-665: Microsoft Security Bulletin Advance Notification for July 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for July 5: Microsoft Security Bulletin Advance Notification for July 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 July 11, 2011 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2011 PLATFORM: Windows Operating System and Components ABSTRACT: Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: TechNet Webcast Microsoft Security Bulletin Summaries and Webcasts Microsoft Security Bulletin Advance Notification for July 2011

362

T-553: Microsoft February 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Microsoft February 2011 Security Bulletin Release 53: Microsoft February 2011 Security Bulletin Release T-553: Microsoft February 2011 Security Bulletin Release February 9, 2011 - 7:28am Addthis PROBLEM: Microsoft February 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms. (Affected Software and Download Locations) ABSTRACT: Microsoft released 21 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference links: Microsoft Security Bulletin Summary for February 2011 Microsoft Technical Security Notifications

363

Making Space for a New Medium: On the Use of Electronic Mail in a Newspaper Newsroom  

Science Conference Proceedings (OSTI)

Within the field of computer-supported cooperative work, there are a continuously growing number of studies of the use of electronic media in groups and organisations. Despite the existence of this impressive body of research, there have been comparatively ... Keywords: computer-mediated communication, electronic mail, ethnographic study, newspaper, newsroom environment, workplace studies

Amelie Hssjer; Kerstin Severinson Eklundh

2009-02-01T23:59:59.000Z

364

A. Y. T. Leung1 e-mail: bcaleung@cityu.edu.hk  

E-Print Network (OSTI)

X. Guo A. Y. T. Leung1 e-mail: bcaleung@cityu.edu.hk Department of Building and Construction, City, Arizona State University, Tempe, AZ 85287-6106 X. Q. He Department of Building and Construction, City of Carbon Nanotubes: An Atomic-Scale Finite Element Study This paper employs the atomic-scale finite element

Jiang, Hanqing

365

NATURAL GAS ADVISORY COMMITTEE 2013-2015 Name Affiliation Phone E-mail Sector June 7  

E-Print Network (OSTI)

NATURAL GAS ADVISORY COMMITTEE 2013-2015 Name Affiliation Phone E-mail Sector June 7 meeting Cocks Friedman, Randy NW Natural Gas (503) 721-2475 randy.friedman@nwnatural.com Distribution Finklea Edward NW-8553 bdickens@ci.tacoma.wa.us Electric Utility Defenbach, Byron Intermountain Gas (208) 377-6080 bdefen

366

NATURAL GAS ADVISORY COMMITTEE 2013-2015 Name Affiliation Phone E-mail Sector  

E-Print Network (OSTI)

NATURAL GAS ADVISORY COMMITTEE 2013-2015 Name Affiliation Phone E-mail Sector Cocks, Michael BPA Natural Gas (503) 721-2475 randy.friedman@nwnatural.com Distribution Finklea Edward NW Ind. Gas Users (503@ci.tacoma.wa.us Electric Utility Defenbach, Byron Intermountain Gas (208) 377-6080 bdefen@intgas.com Distribution Dahlberg

367

Research Projects Addressing Technical Challenges to Environmentally...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to improve the safety and minimize the environmental impacts of oil and natural gas exploration and production. The projects will address research needs primarily in four...

368

Recommendations to Address Power Reliability Concerns Raised...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns Raised as a...

369

NIST Scientists Address 'Wrinkles' in Transparent Film ...  

Science Conference Proceedings (OSTI)

NIST Scientists Address 'Wrinkles' in Transparent Film Development. ... High on the wish list of the solar power industry is a cheap, flexible ...

2012-10-02T23:59:59.000Z

370

Research Projects Addressing Technical Challenges to Environmentally...  

NLE Websites -- All DOE Office Websites (Extended Search)

projects aimed at addressing the technical challenges of producing natural gas from shales and tight sands, while simultaneously reducing environmental footprints and risks,...

371

Tobias Maile  

NLE Websites -- All DOE Office Websites (Extended Search)

and Matthew Garr. "A software tool to compare measured and simulated building energy performance data." In IBPSA Building Simulation 2011. Sydney, Australia, 2011....

372

Smart Grid RFI: Addressing Policy and Logistical Challenges  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Delivery and Energy Reliability Electricity Delivery and Energy Reliability 1000 Independence Avenue, SW Room 8H033 Washington, DC 20585 Submitted electronically via smartgridpolicy@hq.doe.gov Smart Grid Request for Information: Addressing Policy and Logistical Challenges Comments of the Alliance to Save Energy The Alliance to Save Energy (the Alliance) thanks the Department of Energy for the opportunity to comment on broad issues of policy and logistical challenges faced in smart grid implementation. The Alliance to Save Energy is a coalition of prominent business, government, environmental, and consumer leaders who promote the efficient use of energy worldwide to benefit consumers, the environment, economy, and national security. The Alliance is a nonprofit 501 (c) (3) organization.

373

Laboratory Equipment Donation Program - OPMO Address List  

Office of Scientific and Technical Information (OSTI)

OPMO Listing OPMO Listing OPMO contact information is listed below. Please refer to your "LEDP Grantee Application Result" e-mail for the name of the OPMO who approved your application. Clayton Acheson Office of River Protection (ORP) P. O. Box 450, MSIN H6-60 Richland, WA 99352 509-373-6140 clayton_s_acheson@orp.doe.gov Orlyn B. Akers Idaho Operations Office (ID) U.S. Department of Energy 1955 Freemont Avenue Idaho Falls, ID 83415-0001 (208) 526-5934 akersob@id.doe.gov Bonnie Anderson Chicago Operations Office (CH) U.S. Department of Energy 9800 South Cass Avenue Argonne, IL 60439 630-252-2134 Bonnie.Anderson@ch.doe.gov mary.cervantes@ch.doe.gov Tim Armstrong Savannah River Operations Office (SR) U.S. Department of Energy P. O. Box A Aiken, SC 29802 (803) 952-8489 timothy.armstrong@srs.gov

374

Capture Effect of Randomly Addressed Polling Protocol  

Science Conference Proceedings (OSTI)

The capture effect, discussed in this paper, is generally considered to enhance the systems performance in a wireless network. This paper also considers the Randomly Addressed Polling (RAP) protocol in the presence of a fading mobile radio ... Keywords: capture effect, noiseless, randomly addressed polling protocol

Jiang-Whai Dai

1999-06-01T23:59:59.000Z

375

Home Address City State Zip Code  

E-Print Network (OSTI)

must be full-time University faculty or staff. To be eligible for the program, participants must live Parking Program will be provided within ten (10) business days. Work Address Work # Home # Cell # Email Address MCTA South Shore Line Full-time Faculty Part-time Faculty Full-time Staff Part-time Staff Please

He, Chuan

376

Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition  

Science Conference Proceedings (OSTI)

As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

Troy Hiltbrand; Daniel Jones

2012-12-01T23:59:59.000Z

377

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

378

PSH-13-0040 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 - In the Matter of Personnel Security 0 - In the Matter of Personnel Security PSH-13-0040 - In the Matter of Personnel Security On July 25, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual' falsifications and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve the security concerns associated with her falsifications on three security forms as well

379

PSH-12-0120 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0120 - In the Matter of Personnel Security Hearing PSH-12-0120 - In the Matter of Personnel Security Hearing PSH-12-0120 - In the Matter of Personnel Security Hearing On February 4, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about falsification and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve these security concerns. Specifically, with respect to the individual's omissions on security forms, she found that the requisite element of "deliberateness" was

380

PSH-12-0122 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0122 - In the Matter of Personnel Security Hearing PSH-12-0122 - In the Matter of Personnel Security Hearing PSH-12-0122 - In the Matter of Personnel Security Hearing On February 15, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about falsification and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve the security concerns associated with his marijuana use while in high school. However, she found that the individual had not sufficiently mitigated the security

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

382

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

383

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

384

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

385

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

386

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

387

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

388

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

389

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

390

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

391

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

392

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

393

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

394

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

395

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

396

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

397

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

398

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

399

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

400

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

402

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

403

On the Dynamics of IP Address Allocation and Availability of End-Hosts  

E-Print Network (OSTI)

The availability of end-hosts and their assigned routable IP addresses has impact on the ability to fight spammers and attackers, and on peer-to-peer application performance. Previous works study the availability of hosts mostly by using either active pinging or by studying access to a mail service, both approaches suffer from inherent inaccuracies. We take a different approach by measuring the IP addresses periodically reported by a uniquely identified group of the hosts running the DIMES agent. This fresh approach provides a chance to measure the true availability of end-hosts and the dynamics of their assigned routable IP addresses. Using a two month study of 1804 hosts, we find that over 60% of the hosts have a fixed IP address and 90% median availability, while some of the remaining hosts have more than 30 different IPs. For those that have periodically changing IP addresses, we find that the median average period per AS is roughly 24 hours, with a strong relation between the offline time and the probabi...

Argon, Oded; Mokryn, Osnat; Schirman, Dvir; Shavitt, Yuval; Weinsberg, Udi

2010-01-01T23:59:59.000Z

404

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

405

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

First Analysis Securities Corporation First Analysis Securities Corporation Jump to: navigation, search Logo: First Analysis Securities Corporation Name First Analysis Securities Corporation Address One South Wacker Drive, Suite 3900 Place Chicago, Illinois Zip 60606 Product Private equity, venture capital, investment banking and equity research. Year founded 1981 Phone number (312) 258-1400 Website http://www.firstanalysis.com/ Coordinates 41.8819019°, -87.6367295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.8819019,"lon":-87.6367295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

406

Advanced Metering Infrastructure Cyber Security Risks  

Science Conference Proceedings (OSTI)

The deployment of advanced metering infrastructure (AMI) systems is introducing millions of components to the electric grid that support two-way communication for next-generation grid applications. Although these systems can increase operational efficiencies and enable new capabilities such as demand-response, they also increase the attack surface for potential adversaries. Utilities must address these new cyber security risks as part of their overall enterprise risk management strategy. These ...

2013-12-23T23:59:59.000Z

407

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

408

Review of the Potential of Nuclear Hydrogen for Addressing Energy Security and Climate Change  

Science Conference Proceedings (OSTI)

Technical Paper / Safety and Technology of Nuclear Hydrogen Production, Control, and Management / Nuclear Hydrogen Production

James E. O'Brien

409

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

410

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

411

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

412

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

413

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

414

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

415

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

416

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

417

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

418

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

419

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

420

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

422

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

423

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

424

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

425

Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems  

SciTech Connect

Portable implantable medical device systems are playing a larger role in modern health care. Increasing attention is now being given to the wireless control interface of these systems. Our position is that wireless security in portable implantable medical device systems is just a part of the overall system security, and increased attention is needed to address low-tech security issues.

Paul, Nathanael R [ORNL; Kohno, Tadayoshi [University of Washington, Seattle

2012-01-01T23:59:59.000Z

426

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

Robert P. Evans

2006-05-01T23:59:59.000Z

427

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

428

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

429

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

430

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

431

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

432

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

433

U-164: Microsoft Security Bulletin Advance Notification for May 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

64: Microsoft Security Bulletin Advance Notification for May 64: Microsoft Security Bulletin Advance Notification for May 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 May 8, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for May 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server, Microsoft Silverlight ABSTRACT: Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address

434

Administrator Thomas D'Agostino, National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Thomas D'Agostino, National Nuclear Security Thomas D'Agostino, National Nuclear Security Administration, Addresses United Nations on Nuclear Disarmament | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Speeches > Administrator Thomas D'Agostino, National Nuclear Security Administration, ... Speech Administrator Thomas D'Agostino, National Nuclear Security

435

Independent Oversight Inspection, Y-12 National Security Complex - April  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection, Y-12 National Security Complex - Inspection, Y-12 National Security Complex - April 2003 Independent Oversight Inspection, Y-12 National Security Complex - April 2003 Inspection of Environment, Safety, and Health Management at the Y-12 National Security Complex The Secretary of Energy's Office of Independent Oversight and Performance Assurance (OA) conducted an inspection of environment, safety, and health (ES&H) at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in March-April 2003. The inspection was performed by OA's Office of Environment, Safety and Health Evaluations. Overall, YSO and BWXT have established a generally effective ISM program. YSO and BWXT management have demonstrated their commitment to continuous improvement and have effective tools and process enhancements to address

436

Administrator Thomas D'Agostino, National Nuclear Security  

National Nuclear Security Administration (NNSA)

Thomas D'Agostino, National Nuclear Security Thomas D'Agostino, National Nuclear Security Administration, Addresses United Nations on Nuclear Disarmament | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Speeches > Administrator Thomas D'Agostino, National Nuclear Security Administration, ... Speech Administrator Thomas D'Agostino, National Nuclear Security

437

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

438

Systems security and functional readiness  

SciTech Connect

In Protective Programming Planning, it is important that every facility or installation be configured to support the basic functions and mission of the using organization. This paper addresses the process of identifying the key functional operations of our facilities in Europe and providing the security necessary to keep them operating in natural and man-made threat environments. Functional Readiness is important since many of our existing facilities in Europe were not constructed to meet the demands of today's requirements. There are increased requirements for real-time systems with classified terminals and stringent access control, tempest and other electronic protection devices. One must prioritize the operations of these systems so that essential functions are provided even when the facilities are affected by overt or covert hostile activities.

Bruckner, D.G.

1988-01-01T23:59:59.000Z

439

Security Analysis and Improvement Model for Web-based Applications  

E-Print Network (OSTI)

Today the web has become a major conduit for information. As the World Wide Web?s popularity continues to increase, information security on the web has become an increasing concern. Web information security is related to availability, confidentiality, and data integrity. According to the reports from http://www.securityfocus.com in May 2006, operating systems account for 9% vulnerability, web-based software systems account for 61% vulnerability, and other applications account for 30% vulnerability. In this dissertation, I present a security analysis model using the Markov Process Model. Risk analysis is conducted using fuzzy logic method and information entropy theory. In a web-based application system, security risk is most related to the current states in software systems and hardware systems, and independent of web application system states in the past. Therefore, the web-based applications can be approximately modeled by the Markov Process Model. The web-based applications can be conceptually expressed in the discrete states of (web_client_good; web_server_good, web_server_vulnerable, web_server_attacked, web_server_security_failed; database_server_good, database_server_vulnerable, database_server_attacked, database_server_security_failed) as state space in the Markov Chain. The vulnerable behavior and system response in the web-based applications are analyzed in this dissertation. The analyses focus on functional availability-related aspects: the probability of reaching a particular security failed state and the mean time to the security failure of a system. Vulnerability risk index is classified in three levels as an indicator of the level of security (low level, high level, and failed level). An illustrative application example is provided. As the second objective of this dissertation, I propose a security improvement model for the web-based applications using the GeoIP services in the formal methods. In the security improvement model, web access is authenticated in role-based access control using user logins, remote IP addresses, and physical locations as subject credentials to combine with the requested objects and privilege modes. Access control algorithms are developed for subjects, objects, and access privileges. A secure implementation architecture is presented. In summary, the dissertation has developed security analysis and improvement model for the web-based application. Future work will address Markov Process Model validation when security data collection becomes easy. Security improvement model will be evaluated in performance aspect.

Wang, Yong

2008-12-01T23:59:59.000Z

440

Integrity, Reliability and Security: The Role of Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

F. Lawson F. Lawson Director, Strategic Center for Natural Gas & Oil National Energy Technology Laboratory General session Natural Gas Technologies Conference 2005 Cosponsors: NETL/Gas Technology Institute Orlando, Florida January 31, 2005 Integrity, Reliability and Security: The Role of Technology Introduction Integrity, reliability, and security encompass all the attributes we want-indeed, need-from our natural gas industry. We need integrity in physical transportation and storage systems, reliability in operating systems, and security in supplies and delivery systems. This conference is the most comprehensive forum for addressing new and evolving technologies impacting all these needs. The conference scope runs the gamut: from finding and producing to storing,

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Property:Address | Open Energy Information  

Open Energy Info (EERE)

Address Address Jump to: navigation, search This is a property of type String. Pages using the property "Address" Showing 25 pages using this property. (previous 25) (next 25) 1 1366 Technologies + 45 Hartwell Avenue + 1st Light Energy, Inc. + 3224 McHennry Ave Suite F + 2 21-Century Silicon, Inc. + 1681 Firman Drive, Suite 103 + 3 3Degrees + 2 Embarcadero Center Suite 2950 + 3M + 3M Center + 3TIER + 2001 Sixth Avenue + 4 4th Day Energy + 38886 River Belle + 5 5 boro biofuel + 100 maiden lane + 8 8minutenergy Renewables, LLC + 111 Woodmere Road, Suite 190 + @ @Ventures (California) + 800 Menlo Avenue, Suite 120 + @Ventures (Massachusetts) + 187 Ballardvale Street, Suite A260 + A A.J. Rose Manufacturing Company + 38000 Chester Road + A1 Sun, Inc. + 1435 4th St. +

442

PSH-13-0060 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60 - In the Matter of Personnel Security 60 - In the Matter of Personnel Security PSH-13-0060 - In the Matter of Personnel Security On August 22, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January and March 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented adequate evidence to mitigate the security concerns associated with his two charges of Driving Under the Influence and his involvement in

443

PSH-11-0024 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24 - In the Matter of Personnel Security Hearing 24 - In the Matter of Personnel Security Hearing PSH-11-0024 - In the Matter of Personnel Security Hearing The individual is an applicant for a DOE security clearance. In March 2011, as part of a background investigation, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address his alcohol use. In addition to the PSI, the LSO requested the individual's medical records and recommended a psychiatric evaluation of the individual by a DOE consultant psychiatrist (DOE psychiatrist). The DOE psychiatrist examined the individual in August 2011 and memorialized his findings in a report (Psychiatric Report). PSH-11-0024.pdf More Documents & Publications TSO-1102 - In the Matter of Personnel Security Hearing TSO-1013 - In the Matter of Personnel Security

444

PSH-12-0074 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the individual's recent efforts to resolve his debt have not yet withstood the test of time. Given the

445

PSH-12-0101 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01 - In the Matter of Personnel Security Hearing 01 - In the Matter of Personnel Security Hearing PSH-12-0101 - In the Matter of Personnel Security Hearing On November 21, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that it was too early to determine whether the individual had demonstrated a sustained pattern of financial responsibility for a

446

PSH-12-0104 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

104 - In the Matter of Personnel Security Hearing 104 - In the Matter of Personnel Security Hearing PSH-12-0104 - In the Matter of Personnel Security Hearing On December 13, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's alcohol use. A DOE psychiatrist examined the individual and concluded that the individual suffers from Alcohol Dependence. His behavior raised security concerns under Criteria H and J. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the individual had

447

PSH-13-0060 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60 - In the Matter of Personnel Security 60 - In the Matter of Personnel Security PSH-13-0060 - In the Matter of Personnel Security On August 22, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January and March 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented adequate evidence to mitigate the security concerns associated with his two charges of Driving Under the Influence and his involvement in

448

PSH-12-0133 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33 - In the Matter of Personnel Security Hearing 33 - In the Matter of Personnel Security Hearing PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated with his misuse of information technology. However, she found that the individual had not sufficiently mitigated the

449

PSH-12-0073 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73 - In the Matter of Personnel Security Hearing 73 - In the Matter of Personnel Security Hearing PSH-12-0073 - In the Matter of Personnel Security Hearing On November 8, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. A Local Security Office (LSO) conducted a Personnel Security Interview of the individual to address concerns about the individual's alcohol use. A DOE consultant psychologist found that the individual suffers from Alcohol Dependence, in early full remission. His behavior raised security concerns under Criteria H, J and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual demonstrated adequate evidence of rehabilitation and thus mitigated the security concerns under Criteria H and J. She

450

PSH-13-0044 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-13-0044 - In the Matter of Personnel Security Hearing On July 26 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. In November and December 2012, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate the security concerns associated with his three charges of Driving

451

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

452

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

453

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemical Safety 2013 Workshop Home Registration Closed Presentations Day 1 Day 2 Day 3 Workshop Information Health and Safety POSTPONED. Future events will be announced. Joint EFCOG/DOE Chemical Management 2013 Workshop March 19-21, 2013 DOE Forrestal Headquarters Auditorium and Remote via Web Includes concurrent 10 CFR 851 Worker Safety and Health Workshop Registration is closed. Contact David Weitzman or Joe Hopkins for possible web conference attendance. REGISTRATION FORM Fields marked with * must be completed. *First Name: *Last Name: Position/Title: Company: Affiliation: Address: City: State: Zip: *Phone: *E-Mail: *Attendee Type: Federal Employee Contractor Employee Other *United States Citizen: Yes No If no, contact Joe Hopkins, 301-903-5619, joe.hopkins@hq.doe.gov

454

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

455

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

456

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

457

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

458

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

459

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

460

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

462

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

463

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

464

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

2005-10-01T23:59:59.000Z

465

Comparison of Routable Control System Security Approaches  

SciTech Connect

This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

2011-06-01T23:59:59.000Z

466

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

467

Addressing & invocation of IMS-attached services  

Science Conference Proceedings (OSTI)

Services provided by non-IMS enabled platforms (e.g. home electronics, entertainment systems, and various home appliances) are typically not accessible to remote users such as IMS subscribers in spite of the ubiquity of modern mobile communications. ... Keywords: IMS, SIP, presence, service addressing, service discovery, service mapping, service registration

Roman Levenshteyn; Ioannis Fikouras; Salvatore Loreto; Gonzalo Camarillo

2007-07-01T23:59:59.000Z

468

Early Science Instruction Addressing Fundamental Issues  

E-Print Network (OSTI)

Commentary Early Science Instruction Addressing Fundamental Issues David Klahr Carnegie Mellon (Vol. Eds.), Handbook of child psychology: Vol. 4. Child psychology in practice (6th ed.). New York acquisition in foundational domains. In W. Damon (Series Ed.) & D. Kuhn & R.S. Siegler (Vol. Eds.), Handbook

Klahr, David

469

Biotech Nano Name School Email Address Module  

E-Print Network (OSTI)

Biotech Nano Name School Email Address Module Ajlouni, Leen Y American Community School Amman leen_ajlouni@hotmail.com Biotech Nano Jordan ajlouniyas@gmail.com Anupindi, Arusha Academy for Science & Design aaofnda@gmail.com Biotech Nano greet_hello@yahoo.com hellosmartboy@gmail.com Bourque, Mary Bangor High School maryebourque

470

Model replication: transformations to address model scalability  

Science Conference Proceedings (OSTI)

In model-driven engineering, it is often desirable to evaluate different design alternatives as they relate to scalability issues of the modeled system. A typical approach to address scalability is model replication, which starts by creating base models ... Keywords: domain-specific modeling, model transformation, model-driven engineering, scalability

Yuehua Lin; Jeff Gray; Jing Zhang; Steve Nordstrom; Aniruddha Gokhale; Sandeep Neema; Swapna Gokhale

2008-11-01T23:59:59.000Z

471

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

472

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

473

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

474

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

475

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

476

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

477

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

478

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

479

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

480

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

482

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

483

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

484

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

485

Safety and Security Interface Technology Initiative  

SciTech Connect

Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. Supporting Excellence in Operations Through Safety Analysis, (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is Safeguards/Security Integration with Safety. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared tool box of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.

Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

2007-05-01T23:59:59.000Z

486

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

487

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

488

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

489

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

490

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

491

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

492

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

493

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

494

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

495

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI für Informatik Univ. Tübingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

496

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

497

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

498

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

499

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

500

Electronic Methods Potentially Secure for Sending Blank ...  

Science Conference Proceedings (OSTI)

... discusses how postal mail and four electronic transmission options (telephone ... as cryptography and back up communications lines, depending on ...

2011-08-10T23:59:59.000Z