Sample records for maritime security act

  1. The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms

    E-Print Network [OSTI]

    Stone, Jonathan Taylor

    2013-02-12T23:59:59.000Z

    ABSTRACT The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms. (May 2013) Jonathan Stone Department of Maritime Administration Texas A&M University Research Advisor: Dr. Joan Mileski Department...

  2. Investigating alternative concepts of operations for a maritime security system of systems

    E-Print Network [OSTI]

    Mekdeci, Brian Anthony

    For complex systems of systems, such as those required to perform maritime security, system architects have numerous choices they may select from, both in the components and in the way the system operates. Component choices, ...

  3. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    SciTech Connect (OSTI)

    Harris, S.; Dunn, D.

    2010-09-07T23:59:59.000Z

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risks of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.

  4. R.M.S. Titanic Maritime Memorial Act of 1986 To encourage international efforts to designate the shipwreck of the R.M.S. Titanic as an

    E-Print Network [OSTI]

    the shipwreck of the R.M.S. Titanic as an international maritime memorial and to provide for reasonable research as an international maritime memorial to the men,' women, and children who perished aboard her; (2) The recent. The Congress declares that the purposes of this Act are: (1) To encourage international efforts to designate

  5. Wetland Conservation The Food Security Act was enacted on

    E-Print Network [OSTI]

    US Army Corps of Engineers

    XII of this Act introduced 3 conservation provisions to address environmental concerns associatedWetland Conservation Compliance #12;The Food Security Act was enacted on December 23, 1985. Title) Conservation ­ "Sodbuster" provision ­ Wetland Conservation, or "Swampbuster" #12;The Swampbuster provision

  6. Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20, 2013)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20 year (FY) 2013 reporting requirements for the Federal Information Security Management Act (FISMA is steadily working to improve its overall information technology (IT) security posture. Nevertheless

  7. Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13, 2014)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13) identified for this year's Federal Information Security Management Act (FISMA) review; however, the Agency Administrator, provides the Office of Inspector General's (OIG) independent assessment of NASA's information

  8. Energy Independence and Security Act of 2007 Select News and Analysis

    E-Print Network [OSTI]

    Collins, Gary S.

    Energy Independence and Security Act of 2007 Select News and Analysis WSU Extension Energy Library and Security Act of 2007 Select News and Analysis WSU Extension Energy Library http://www.energy/01/15/Analysis-Biofuels-law- attracts-opposition/UPI-42461200409947/ New Energy Law to Phase Out Today's Common

  9. Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12-002, October 17, 2011)

    E-Print Network [OSTI]

    Christian, Eric

    Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12's information technology (IT) security posture. For FY 2011, we adopted a risk-based approach in which we required areas of review for FY 2011 Federal Information Security Management Act (FISMA) reporting: · Risk

  10. Order Code RL34294 Energy Independence and Security Act of 2007

    E-Print Network [OSTI]

    Laughlin, Robert B.

    for energy efficiency and renewable energy. #12;CRS Key Policy Staff Area of Expertise Name TelephoneOrder Code RL34294 Energy Independence and Security Act of 2007: A Summary of Major Provisions December 21, 2007 Fred Sissine, Coordinator Specialist in Energy Policy Resources, Science, and Industry

  11. Federal Information Security Management Act: Fiscal Year 2012 Evaluation (IG-13-001, October 10, 2012)

    E-Print Network [OSTI]

    Federal Information Security Management Act: Fiscal Year 2012 Evaluation (IG-13-001, October 10 Administrator, provides the Office of Inspector General's (OIG) independent assessment of NASA's information that NASA has established a program to address the challenges in each of the areas that the Office

  12. Energy Independence and Security Act of 2007: Summary of Provisions (released in AEO2008)

    Reports and Publications (EIA)

    2008-01-01T23:59:59.000Z

    The Energy Independence and Security Act of 2007 was signed into law on December 19, 2007, and became Public Law 110-140. Provisions in EISA2007 that require funding appropriations to be implemented, whose impact is highly uncertain, or that require further specification by federal agencies or Congress are not included in Annual Energy Outlook 2008 (AEO). For example, the Energy Information Administration (EIA) does not try to anticipate policy responses to the many studies required by EISA2007, nor to predict the impact of research and development (R&D) funding authorizations included in the bill. Moreover, AEO2008 does not include any provision that addresses a level of detail beyond that modeled in the National Energy Modeling System (NEMS), which was used to develop the AEO2008 projections. AEO2008 addresses only those provisions in EISA2007 that establish specific tax credits, incentives, or standards.

  13. Energy Market and Economic Impacts of H.R. 2454, the American Clean Energy and Security Act of 2009

    Reports and Publications (EIA)

    2009-01-01T23:59:59.000Z

    This report responds to a request from Chairman Henry Waxman and Chairman Edward Markey for an analysis of H.R. 2454, the American Clean Energy and Security Act of 2009 (ACESA). ACESA, as passed by the House of Representatives on June 26, 2009, is a complex bill that regulates emissions of greenhouse gases through market-based mechanisms, efficiency programs, and economic incentives.

  14. The Contribution of Bayesian Networks to Manage Risks of Maritime Piracy

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    the coast of Nigeria ended in the kidnap of 19 crew members and a reduction in daily oil production of 45 to the security of these energy production installations and the maritime shipping of oil. Monitoring methods

  15. Evolution of interagency cooperation in the United States Government : the Maritime Operational Threat Response Plan

    E-Print Network [OSTI]

    Tomasulo, Gary L., Jr

    2010-01-01T23:59:59.000Z

    Following the September 11, 2001 terrorist attacks, there was concern among maritime security experts that terrorist or criminal organizations that wanted to do harm to the United States could exploit gaps that existed ...

  16. The Maritime Administration's Energy and Emissions Program -...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 The Maritime Administration's Energy and Emissions Program - Part 1 2002 DEER Conference Presentation: Maritime Administration 2002deergore1.pdf More Documents & Publications...

  17. The Maritime Administration's Energy and Emissions Program -...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2 The Maritime Administration's Energy and Emissions Program - Part 2 2002 DEER Conference Presentation: Maritime Administration 2002deergore2.pdf More Documents & Publications...

  18. Cooperative measures to mitigate Asia-Pacific maritime conflicts.

    SciTech Connect (OSTI)

    Chai, Wen-Chung (Taiwan Navy)

    2003-05-01T23:59:59.000Z

    The economies of East Asia are predominantly export based and, therefore, place special emphasis on the security of the sea lines of communication (SLOCs). Due to economic globalization, the United States shares these concerns. Cooperative measures by the concerned parties could reduce the potential for disruption by maritime conflicts. Primary threats against the SLOCs are disputes over the resources under the seas, disputes over some small island groups, disputes between particular parties (China-Taiwan and North-South Korea), or illegal activities like smuggling, piracy, or terrorism. This paper provides an overview on these threats, issue by issue, to identify common elements and needed cooperation. Cooperation on other topics such as search and rescue, fisheries protection, and oil spill response may help support improved relations to prevent maritime conflicts. Many technologies can help support maritime cooperation, including improved communications links, tracking and emergency beacon devices, and satellite imaging. Appropriate technical and political means are suggested for each threat to the SLOCs.

  19. Lake Ontario Maritime Cultural Landscape 

    E-Print Network [OSTI]

    Ford, Benjamin L.

    2010-10-12T23:59:59.000Z

    The goal of the Lake Ontario Maritime Cultural Landscape project was to investigate the nature and distribution of archaeological sites along the northeast shoreline of Lake Ontario while examining the environmental, ...

  20. A Bayesian Network to Manage Risks of Maritime Piracy against Offshore Oil Fields

    E-Print Network [OSTI]

    of petroleum, and on the other hand shipping capable of transporting crude oil between production and consumption sites. Modern piracy is currently the major threat to the security of these energy production with the International Maritime Bureau5 compared to 487 reports in 2010. At production sites, monitoring methods

  1. Preserving the Submerged and Coastal Maritime Heritage of the United States

    E-Print Network [OSTI]

    Catsambis, Alexis

    2012-10-19T23:59:59.000Z

    Preserving the Submerged and Coastal Maritime Heritage of the United States. (August 2012) Alexis Catsambis, B.A., University of Birmingham, U.K.; M.A., Texas A&M University Chair of Advisory Committee: Dr. Kevin J. Crisman The United States... ............................................................................................. 363 xvi NOMENCLATURE AA Antiquities Act of 1906, as amended ACHP Advisory Council on Historic Preservation ASA Abandoned Shipwreck Act of 1987 AHPA Archeological and Historic Preservation Act, as amended ARPA Archaeological Resources...

  2. Recent Diesel Engine Emission Mitigation Activities of the Maritime...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diesel Engine Emission Mitigation Activities of the Maritime Administration Energy Technologies Program Recent Diesel Engine Emission Mitigation Activities of the Maritime...

  3. Feasibility analysis of scanning 100% of maritime cargo containers for fissile material

    E-Print Network [OSTI]

    Foley, William E., III

    2008-01-01T23:59:59.000Z

    On August 3, 2007, President George W. Bush signed into law H.R. 1: Implementing Recommendations of the 9/11 Commission Act of 2007. The law mandates that 100% of air and maritime cargo must be scanned prior to entering ...

  4. Environmental Policy Factors in the Maritime Industry and Anticipated Regulatory Trends 

    E-Print Network [OSTI]

    Hayes, Richard D.

    2011-08-08T23:59:59.000Z

    on the subject of environmental norms in the Maritime Industry. Starting with the Oil and Pollution Act of 1954 (OILPOL) and the International Convention for the Prevention of Pollution from Ships 1973/78 (MARPOL), there has been increased frequency of adoption...

  5. Freedom of Information Act/Privacy Act Requests | National Nuclear...

    National Nuclear Security Administration (NNSA)

    ActPrivacy Act Requests | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  6. Sandia National Laboratories: maritime technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security, Microgrid, News, News & Events, Partnership, Renewable Energy, SMART Grid, Transmission Grid Integration, Transportation Energy Under an expanded...

  7. Harbour Island: The Comparative Archaeology of a Maritime Community

    E-Print Network [OSTI]

    Hatch, Heather E

    2013-08-01T23:59:59.000Z

    assemblages of maritime communities that indicate maritimity. Analysis relies on Stanley South's artifact classification system and his Carolina Artifact pattern. The nine properties are compared among themselves as well as with four other sites from...

  8. Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1 , Kalyan Moy Gupta1.lastname@knexusresearch.com | david.aha@nrl.navy.mil Abstract Maritime threat detection is a challenging problem because maritime them on a threat recognition task using track data obtained from force protection naval exercises

  9. Solid Waste Management Act (Oklahoma)

    Broader source: Energy.gov [DOE]

    This Act establishes rules for the permitting, posting of security, construction, operation, closure, maintenance and remediation of solid waste disposal sites; disposal of solid waste in ways that...

  10. Wave Energy Harvesting unmanned maritime vehicle, Concept and Applications

    E-Print Network [OSTI]

    Frandsen, Jannette B.

    Wave Energy Harvesting unmanned maritime vehicle, Concept and Applications Justin Manley Senior). By harvesting abundant natural energy Wave Gliders provide a persistent ocean presence to commercial scientific

  11. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  12. Maritime Threat Detection using Plan Recognition Bryan Auslander1

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Maritime Threat Detection using Plan Recognition Bryan Auslander1 , Kalyan Moy Gupta1 , & David W algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and for threat detection. We compare their performance with a behavior recognition algorithm on simulated

  13. Sandia Energy - Maritime Fuel Cell Project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand RequirementsCoatingsUltra-High-VoltagePowerUpdatesDevelopment ReferenceMaritime

  14. Maine Maritime Academy | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |JilinLu an Group Jump to:Macquarie EnergyMahindra REVA Jump to:Maritime

  15. S. 2415: Title I may be cited as the Uranium Enrichment Act of 1990; Title II may be cited as the Uranium Security and Tailings Reclamation Act of 1989; and Title III may be cited as The Solar, Wind, Waste, and Geothermal Power Production Incentives Act of 1990, introduced in the Senate, One Hundred First Congress, Second Session, April 4, 1990

    SciTech Connect (OSTI)

    Not Available

    1990-01-01T23:59:59.000Z

    S. 2415 (which started out as a bill to encourage solar and geothermal power generation) now would amend the Atomic Energy Act of 1954 to redirect uranium enrichment enterprises to further the national interest, respond to competitive market forces, and to ensure the nation's common defense and security. It would establish a United States Enrichment Corporation for the following purposes: to acquire feed materials, enriched uranium, and enrichment facilities; to operate these facilities; to market enriched uranium for governmental purposes and qualified domestic and foreign persons; to conduct research into uranium enrichment; and to operate as a profitable, self-financing, reliable corporation and in a manner consistent with the health and safety of the public. The bill describes powers and duties of the corporation; the organization, finance, and management; decontamination and decommissioning. The second part of the bill would ensure an adequate supply of domestic uranium for defense and power production; provide assistance to the domestic uranium industry; and establish, facilitate, and expedite a comprehensive system for financing reclamation and remedial action at active uranium and thorium processing sites. The third part of the bill would remove the size limitations on power production facilities now part of the Public Utility Regulatory Policies Act of 1978. Solar, wind, waste, or geothermal power facilities would no longer have to be less than 80 MW to qualify as a small power production facility.

  16. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  17. Recovery Act Workers Demolish Facility Tied to Project Pluto...

    Office of Environmental Management (EM)

    Recovery and Rein- vestment Act accomplishment helping clean up traces of past nuclear testing at the Nevada National Security Site (NNSS). Recovery Act workers safely hauled...

  18. MIRPLib - A library of maritime inventory routing problem instances

    E-Print Network [OSTI]

    Dimitri Papageorgiou

    2013-08-28T23:59:59.000Z

    Aug 28, 2013 ... ... class, we introduce a core model for it cast as a mixed-integer linear program. ... routing and inventory management problems in a maritime setting, no data ... and (3) provide a template for other researchers when specifying ...

  19. Supporting Intelligent and Trustworthy Maritime Path Planning Decisions

    E-Print Network [OSTI]

    Cummings, M.L.

    2010-01-01T23:59:59.000Z

    The risk of maritime collisions and groundings has dramatically increased in the past five years despite technological advancements such as GPS-based navigation tools and electronic charts which may add to, instead of ...

  20. A comparative study of maritime operations in India

    E-Print Network [OSTI]

    Mukundan, Harish

    2007-01-01T23:59:59.000Z

    This thesis studies the maritime sector of India, specifically using China as a basis for comparison. Chinese economic impact is studied under the two major headings: the effective use of non-living and living resources. ...

  1. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  2. Maritime Interdiction Operations Small Craft Detection

    SciTech Connect (OSTI)

    Dougan, A D; Trombino, D; Dunlop, W; Bordetsky, A

    2010-01-26T23:59:59.000Z

    The Naval Postgraduate School has been conducting Tactical Network Topology (TNT) Maritime Interdiction Operations (MIO) experiments with Lawrence Livermore National Laboratory (LLNL) since early in 2005. In this work, we are investigating cutting edge technology to evaluate use of networks, advanced sensors and collaborative technology for globally-supported maritime interdiction operations. Some examples of our research include communications in harsh environments, between moving ships at sea; small boat drive-by radiation detection; network-centric collaboration with global partners; situational awareness; prototype sensors & biometric instruments. Since 2006, we have studied the concept of using a small vessel with fixed radiation sensors to do initial searches for illicit radioactive materials. In our work, we continue to evaluate concepts of operation for small boat monitoring. For example, in San Francisco Bay we established a simulated choke point using two RHIBs. Each RHIB had a large sodium iodide radiation sensor on board, mounted on the side nearest to the passing potential target boats. Once detections were made, notification over the network prompted a chase RHIB also equipped with a radiation sensor to further investigate the potential target. We have also used an unmanned surface vessel (USV) carrying a radiation sensor to perform the initial discovery. The USV was controlled remotely and to drive by boats in different configurations. The potential target vessels were arranged in a line, as a choke point and randomly spaced in the water. Search plans were problematic when weather, waves and drift complicated the ability to stay in one place. A further challenge is to both detect and identify the radioactive materials during the drive-by. Our radiation detection system, ARAM, Adaptable Radiation Area Monitor, is able to detect, alarm and quickly identify plausible radionuclides in real time. We have performed a number of experiments to better understand parameters of vessel speed, time, shielding, and distance in this complex three-dimensional space. At the NMIOTC in September 2009, we employed a dual detector portal followed by a chase. In this event, the challenge was to maintain communications after a lapse. When the chase went past the line-of sight reach of the Tactical Operational Center's (TOC) antenna, with interference from a fortress island in Suda Bay, Wave Relay extended the network for continued observation. Sodium iodide radiation detectors were mounted on two Hellenic Navy SEAL fast boats. After making the detection one of the portal boats maintained line-of sight while the other pursued the target vessel. Network access via Wave Relay antennas was maintained until the conclusion of the chase scenario. Progress has been made in the detection of radioactive materials in the maritime environment. The progression of the TNT MIO experiments has demonstrated the potential of the hardware to solve the problems encountered in this physically challenging environment. There continue to be interesting opportunities for research and development. These experiments provide a variety of platforms and motivated participants to perform real-world testing as solutions are made available.

  3. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  4. NIST Computer Security Division csrc.nist.gov Supplemental Guidance on

    E-Print Network [OSTI]

    -03, Enhancing the Security of Federal Information and Information Systems, stated that, "Our nation's security monitoring, or security authorization. Keywords Federal Information Security Management Act, Information Information For additional information on NIST's Computer Security Division programs, projects

  5. Northwest Regional Technology Center, March 2013 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    to homeland security in the region, and this issue highlights Puget Sound Regional Blue Force Tracking Puget Sound Regional Blue Force Tracking Initiative The Puget Sound Regional Blue Force Tracking (BFTS the Puget Sound Area Maritime Security Committee Area of Responsibility. As part of the Initiative

  6. OurStory: Life on the Water Maritime Munchies

    E-Print Network [OSTI]

    Mathis, Wayne N.

    or in the water, with a powerful light that gives a signal to guide seafarers maritime: of, relating to, or bordering a body of water seafarer: a person who operates or assists in operating a ship swanky: (historical definition) a drink from the 1800s that ended thirst and provided energy to workers on land or on the water

  7. Draft Horizon 2020 Work Programme 2014-2015 in the area of Food security, sustainable agriculture and forestry,

    E-Print Network [OSTI]

    Greifswald, Ernst-Moritz-Arndt-Universität

    agriculture and forestry, marine and maritime and inland water research and the bioeconomy Important notice of this document. #12;HORIZON 2020 ­ WORK PROGRAMME 2014-2015 Food security, sustainable agriculture and forestry ..................... 14 SFS-7-2014/2015: Genetic resources and agricultural diversity for food security, productivity

  8. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07T23:59:59.000Z

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  9. Energy Efficiency and Renewable Energy Research, Development, and Deployment in Meeting Greenhouse Gas Mitigation Goals: The Case of the Lieberman-Warner Climate Security Act of 2007 (S.2191)

    SciTech Connect (OSTI)

    Showalter, S.; Wood, F.; Vimmerstedt, L.

    2010-06-01T23:59:59.000Z

    The U.S. federal government is considering actions to reduce greenhouse gas emissions. Renewable energy and energy efficiency technologies could help reduce greenhouse gas emissions, so the cost of these technologies could significantly influence the overall cost of meeting greenhouse gas limits. This paper examines the potential benefit of reduced technology cost by analyzing the case of the Lieberman-Warner Climate Security Act of 2007 (S.2191). This act had a goal of reducing national carbon emissions in 2050 to levels 72 percent below 2006 emission levels. In April 2008, the U.S. Department of Energy, Energy Information Administration (EIA) published an analysis of the effects of S.2191 on the U.S. energy sector. This report presents a similar analysis: both analyses examined the impacts of S.2191, and both used versions of the National Energy Modeling System. The analysis reported here used modified technology assumptions to reflect U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy (EERE) program goals. The results show that achieving EERE program goals could reduce the cost of meeting greenhouse gas limits, reduce the cost of renewable electricity generation and biofuels, and reduce energy intensity.

  10. Triple acting radial seal

    DOE Patents [OSTI]

    Ebert, Todd A (West Palm Beach, FL); Carella, John A (Jupiter, FL)

    2012-03-13T23:59:59.000Z

    A triple acting radial seal used as an interstage seal assembly in a gas turbine engine, where the seal assembly includes an interstage seal support extending from a stationary inner shroud of a vane ring, the interstage seal support includes a larger annular radial inward facing groove in which an outer annular floating seal assembly is secured for radial displacement, and the outer annular floating seal assembly includes a smaller annular radial inward facing groove in which an inner annular floating seal assembly is secured also for radial displacement. A compliant seal is secured to the inner annular floating seal assembly. The outer annular floating seal assembly encapsulates the inner annular floating seal assembly which is made from a very low alpha material in order to reduce thermal stress.

  11. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act of 2002 3 Security Management and Assistance Group (SMA) 4 FISMA Implementation Project 4 Publications

  12. URANIUM DETECTION USING SMALL SCINTILLATORS IN A MARITIME ENVIRONMENT

    SciTech Connect (OSTI)

    Hofstetter, K; Donna Beals, D; Ken Odell, K

    2006-05-12T23:59:59.000Z

    The performance of several commercially available portable radiation spectrometers containing small NaI(Tl) scintillation detectors has been studied at the Savannah River National Laboratory (SRNL). These hand-held radioisotope identifiers are used by field personnel to detect and identify the illegal transport of uranium as a deterrent to undeclared nuclear proliferation or nuclear terrorism. The detection of uranium in a variety of chemical forms and isotopic enrichments presents some unique challenges in the maritime environment. This study was conducted using a variety of shielded and unshielded uranium sources in a simulated maritime environment. The results include estimates of the detection sensitivity for various isotopic enrichments and configurations using the manufacturer's spectral analysis firmware. More sophisticated methods for analyzing the spectra off-line are also evaluated to determine the detection limits and enrichment sensitivities from the field measurements.

  13. Harbour Island: The Comparative Archaeology of a Maritime Community 

    E-Print Network [OSTI]

    Hatch, Heather E

    2013-08-01T23:59:59.000Z

    Marie Neilly and the Westley Methodist Church of Harbour Island, Pat Barry, Jeremy Clark, and Wade Higgs and Brenda Clark Higgs. Many others in the community also provided support and encouragement, and I am deeply grateful to them as well. v I... Street Higgs House (DHH)???????????????????... 154 Maritime Cultural Landscape of Harbour Island?????????????... 157 Summary????????????????????????????? 162 CHAPTER VI PATTERNS OF CULTURE AT HARBOUR ISLAND ...................... 163 Kitchen Group...

  14. Post-Closure Report for Closed Resource Conservation and Recovery Act Corrective Action Units, Nevada National Security Site, Nevada, For Fiscal Year 2010

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2011-01-26T23:59:59.000Z

    This report serves as the combined annual report for post-closure activities for the following closed Corrective Action Units (CAUs): (1) CAU 90, Area 2 Bitcutter Containment; (2) CAU 91, Area 3 U-3fi Injection Well; (3) CAU 92, Area 6 Decon Pond Facility; (4) CAU 110, Area 3 WMD U-3ax/bl Crater; and (5) CAU 112, Area 23 Hazardous Waste Trenches. The locations of the sites are shown in Figure 1. This report covers fiscal year 2010 (October 2009-September 2010). The post-closure requirements for these sites are described in Resource Conservation and Recovery Act Permit Number NEV HW0021 and summarized in each CAU-specific section in Section 1.0 of this report. Site inspections are conducted semiannually at CAUs 90 and 91 and quarterly at CAUs 92, 110, and 112. Additional inspections are conducted at CAU 92 if precipitation occurs in excess of 0.50 inches in a 24-hour period. Inspections include an evaluation of the condition of the units and identification of any deficiencies that may compromise the integrity of the units. The condition of covers, fencing, signs, gates, and locks is documented. In addition, soil moisture monitoring and subsidence surveys are conducted at CAU 110. The results of the inspections, summary of maintenance activities, results of vegetations surveys, and analysis of monitoring data are presented in this report. Copies of the inspection checklists are included as Appendix A. Field notes completed during each inspection are included in Appendix B. Photographs taken during the site inspections are included in Appendix C.

  15. President Ford Signs the Energy Reorganization Act of 1974 |...

    National Nuclear Security Administration (NNSA)

    Ford Signs the Energy Reorganization Act of 1974 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  16. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  17. Post-Closure Report for Closed Resource Conservation and Recovery Act Corrective Action Units, Nevada National Security Site, Nevada for Fiscal Year 2011 (October 2010-September 2011)

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2012-01-18T23:59:59.000Z

    This report serves as the combined annual report for post-closure activities for the following closed Corrective Action Units (CAUs): (1) CAU 90, Area 2 Bitcutter Containment; (2) CAU 91, Area 3 U-3fi Injection Well; (3) CAU 92, Area 6 Decon Pond Facility; (4) CAU 110, Area 3 WMD U-3ax/bl Crater; and (5) CAU 112, Area 23 Hazardous Waste Trenches. This report covers fiscal year 2011 (October 2010-September 2011). The post-closure requirements for these sites are described in Resource Conservation and Recovery Act Permit Number NEV HW0101 and summarized in each CAU-specific section in Section 1.0 of this report. Site inspections are conducted semiannually at CAUs 90 and 91 and quarterly at CAUs 92, 110, and 112. Additional inspections are conducted at CAU 92 if precipitation occurs in excess of 0.50 inches in a 24-hour period. Inspections include an evaluation of the condition of the units and identification of any deficiencies that may compromise the integrity of the units. The condition of covers, fencing, signs, gates, and locks is documented. In addition, soil moisture monitoring and subsidence surveys are conducted at CAU 110. The results of the inspections, summary of maintenance activities, results of vegetations surveys, and analysis of monitoring data are presented in this report. Copies of the inspection checklists are included as Appendix A. Field notes completed during each inspection are included in Appendix B. Photographs taken during the inspections are included in Appendix C. It is recommended to continue semiannual inspections at CAUs 90 and 91; quarterly inspections at CAUs 92, 110, and 112; and additional inspections at CAU 92 if precipitation occurs in excess of 0.50 inches in a 24-hour period. At CAU 92, it is recommended to remove the wave barriers, as they have not proven to be necessary to protect the cover. At CAU 110, it is recommended to continue annual vegetation monitoring and soil moisture monitoring, and to reduce the frequency of subsidence surveys from twice per year to once every other year (biennially).

  18. Energy and Global Security - Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Team Helps Lead Charge to Revolutionize Energy Storage Gizmodo UK: Fast-Acting Nuclear Reactor Will Power through Piles of Plutonium Daily Herald: Fagel Book Named Security Book of...

  19. Recovery Act

    Broader source: Energy.gov [DOE]

    Recovery Act and Energy Department programs were designed to stimulate the economy while creating new power sources, conserving resources and aligning the nation to once again lead the global energy economy.

  20. Optimisation of steam extraction of oil from maritime pine needles S.A. REZZOUG

    E-Print Network [OSTI]

    Boyer, Edmond

    1 Optimisation of steam extraction of oil from maritime pine needles S.A. REZZOUG University of La Rochelle, LEPTIAB. EA 4226, UFR Sciences. Avenue M. Crepeau, 17042 La Rochelle, France tel: 33 (5) 46 45 86 15; fax: 33(5) 46 45 86 16; e-mail : sarezzou@univ-lr.fr Abstract Essential oil from pine maritime

  1. International Maritime Law Institute (IMLI) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInterias Solar Energy Jump to:IES Jump to: navigation,Maritime Law

  2. Massachusetts Maritime Academy Wind Farm | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, searchOfRose Bend <Stevens Jump to:source History ViewHydrothermalMaritime

  3. Maritime Electric- Net Metering (Prince Edward Island, Canada)

    Broader source: Energy.gov [DOE]

    In December 2005 The Renewable Energy Act and associated Regulations came into effect. A Government policy objective incorporated in the Act was the introduction of net metering for...

  4. Privacy Act Disclosures | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica TreatyWastewants youNationalNuclear

  5. Privacy Act Exemptions | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica TreatyWastewants youNationalNuclearExemptions |

  6. Privacy Act Requests | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica TreatyWastewantsRequests | National Nuclear

  7. Privacy Act Statement | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica TreatyWastewantsRequests | National

  8. Privacy Act Violations | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica TreatyWastewantsRequests |

  9. No Fear Act | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > The EnergyCenterDioxideDocumentationThreeNewsfuel combustion |No Fear

  10. AT&TSecurity Consulting Information Assurance Federal Information Security

    E-Print Network [OSTI]

    Fisher, Kathleen

    AT&TSecurity Consulting Information Assurance ­ Federal Information Security Management Act (FISMA requirements under the Federal Information Security Management Act of 2002, of general support systems the security controls for the information system. The AT&T Consulting methodology is based on National

  11. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  12. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  13. 2011 WSU SPOKANE ANNUAL Security/Fire Safety

    E-Print Network [OSTI]

    Collins, Gary S.

    Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information Information and Preparation of Statistics 1 Director's Letter 2 Mission Statement and Security Department INFORMATION The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (also

  14. 2012 WSU SPOKANE ANNUAL Security/Fire Safety

    E-Print Network [OSTI]

    Collins, Gary S.

    Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information Information and Preparation of Statistics 1 Director's Letter 2 Mission Statement and Security Department INFORMATION The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (also

  15. Inhabiting cycles of maritime obsolescence : redirecting the National Defense Reserve Fleet

    E-Print Network [OSTI]

    Polansky, Nicholas W. (Nicholas Wilkes)

    2014-01-01T23:59:59.000Z

    Defense is in a state of obsolescence. The metrics of risk have changed from threat of military invasion to that of weather. Infrastructure is in a state of transition. The Maritime Administration's National Defense Reserve ...

  16. Convective cloud and rainfall processes over the Maritime Continent : simulation and analysis of the diurnal cycle

    E-Print Network [OSTI]

    Gianotti, Rebecca L. (Rebecca Louise)

    2013-01-01T23:59:59.000Z

    The Maritime Continent experiences strong moist convection, which produces significant rainfall and drives large fluxes of heat and moisture to the upper troposphere. Despite the importance of these processes to global ...

  17. Success at Sea: Maritime Votive Offerings and Naval Dedications in Antiquity

    E-Print Network [OSTI]

    Streuding, Jaclyn Haley

    2014-06-26T23:59:59.000Z

    , as well as explore the relationship between dedicant and dedicatee. Also, I consider the geographical location of a site or maritime sanctuary, and the impact it may have had on the types of objects offered. Following a thorough investigation...

  18. Assessing the impact of automated path planning aids in the maritime community

    E-Print Network [OSTI]

    Buchin, Mariela E

    2009-01-01T23:59:59.000Z

    In the area of merchant maritime navigation, electronic charts are a relatively new tool. As a result, navigational path planning environments that allow users to manually enter a path onto an electronic chart are becoming ...

  19. Environmental Policy Factors in the Maritime Industry and Anticipated Regulatory Trends

    E-Print Network [OSTI]

    Hayes, Richard D.

    2011-08-08T23:59:59.000Z

    Increased environmental regulatory policy has been put in place by the International Maritime Organization (IMO) in response to waterborne oil pollution events. We examine the IMO regulatory response to these incidences. This paper covers literature...

  20. The development of a marine engineering program for training cruises of the Texas Maritime Academy 

    E-Print Network [OSTI]

    Luehning, Klaus Volker

    1966-01-01T23:59:59.000Z

    THE DEVELOPMENT OF A MARINE ENGINEERING PROGRAM FOR TRAINING CRUISES OF THE TEXAS MARITIME ACADEMY A Thesis by KLAUS V. LUEHNING Submitted to the Graduate College of the Texas ASM University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE January 1/66 Industrial Educatior. THE DEVELOPMENT OF A MARINE ENGINEERING PROGRAM FOR TRAINING CRUISES OF THE TEXAS MARITIME ACADEMY A Thesis by KLAUS V. LUEHNING Approved s. s to style and content by: (Chairman...

  1. Evaluation Report on The Department's Unclassified Cyber Security...

    Office of Environmental Management (EM)

    users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act...

  2. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  3. MARITIME SHIPPING IN NORTHEAST ASIA: LAW OF THE SEAS, SEA LANES, AND SECURITY

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun

    1998-01-01T23:59:59.000Z

    data in several sources: WSTS, OECD, and Dre- wry Shipping Consultants, Pacific Rim Trade and Shipping: The Powerhouse

  4. Enhancing the Security of the Maritime Supply Chain Gift Basket | National

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContractElectron-StateEnergyHeavyDepartmentebba Sign In About |Nuclear

  5. The Dermatology Acting Internship

    E-Print Network [OSTI]

    Stephens, John B; Raimer, Sharon S; Jr, Richard F Wagner

    2011-01-01T23:59:59.000Z

    our experience with an acting internship in dermatology, weevolving role of the acting internship in the medical SchoolThe Dermatology Acting Internship John B Stephens MD, Sharon

  6. Radiation Protection Act (Pennsylvania)

    Broader source: Energy.gov [DOE]

    This Act combines the radiation safety provisions of The Atomic Energy Development and Radiation Control Act and the Environmental Radiation Protection Act, and empowers the Department of...

  7. Department of Homeland Security, Science and Technology Directorate, Borders and Maritime Security Division: Renewable Energy Research Roadmap

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration wouldDECOMPOSITIONPortalTo helpUniversitiesof Department ofNREL is a

  8. Final Recovery Act-Funded Demolition Underway at Y-12 | National...

    National Nuclear Security Administration (NNSA)

    Recovery Act-Funded Demolition Underway at Y-12 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  9. Energy and Water Development and Related Agencies Appropriations Act of 2010

    Broader source: Energy.gov [DOE]

    Section 312 of the Energy and Water Development and Related Agencies Appropriations Act of 2010 amends Section 136 of the Energy Independence and Security Act to include ultra-efficient vehicles within the definition of advanced technology vehicles.

  10. Freedom of Information Act (FOIA) and Privacy Act Requests |...

    Energy Savers [EERE]

    Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests FOIA and Privacy Act Requests FOIA Requests FOIA information...

  11. Recovery Act: State Assistance for Recovery Act Related Electricity...

    Energy Savers [EERE]

    Information Center Recovery Act Recovery Act: State Assistance for Recovery Act Related Electricity Policies Recovery Act: State Assistance for Recovery Act Related...

  12. Lisa C. Tracy Acting Director Division of Natural Gas Regulatory...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    November 17, 2014 Lisa C. Tracy Acting Director Division of Natural Gas Regulatory Activities U.S. Department of Energy (FE-34) Office of Oil and Gas Global Security Office of...

  13. A Longitudinal Analysis of the Causal Factors in Major Maritime Accidents in the USA and Canada (1996-2006)

    E-Print Network [OSTI]

    Williamson, John

    A Longitudinal Analysis of the Causal Factors in Major Maritime Accidents in the USA and Canada an analysis that extends across the findings presented over ten years investigations into maritime accidents, Hampton, VA 23681-2199, USA c.m.holloway@nasa.gov Abstract Accident reports provide important insights

  14. A New Approach to Securing Audio Conference Tools Zhenkai Zhu

    E-Print Network [OSTI]

    California at Los Angeles, University of

    architecture based on content-centric networking, is designed to secure data directly, instead of securing conference tool. The basic design of ACT is presented in [13], which is based on the named data paradigmA New Approach to Securing Audio Conference Tools Zhenkai Zhu UCLA Los Angeles, California, USA

  15. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  16. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  17. Maritime Cliffs and Ironshore -Grand CaymanMaritime Cliffs and Ironshore -Grand Cayman 0 1 2 3 4 50.5

    E-Print Network [OSTI]

    Exeter, University of

    CaymanMaritime Cliffs and Ironshore - Little Cayman 0 0.5 1 1.5 2 2.50.25 Kilometers Cayman Islands 0 0.5 1 1.5 2 2.50.25 Kilometers Cayman Islands National Biodiversity Action Plan www Mosaic #12;Sandy Beach and Cobble - Little CaymanSandy Beach and Cobble - Little Cayman 0 0.5 1 1.5 2 2

  18. Water Management Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act regulates and registers water withdrawals in the Commonwealth of Massachusetts to enable effective planning and management of water use and conservation. The Act establishes a Water...

  19. Alternative mixed-integer linear programming models of a maritime inventory routing problem

    E-Print Network [OSTI]

    Grossmann, Ignacio E.

    Alternative mixed-integer linear programming models of a maritime inventory routing problem Jiang is enhanced by reformulating the time assignment constraints. Next, we present a model based on event points. Sherali et al (1999) formulated a mixed-integer programming model based on a discrete time representation

  20. Our MSc in Maritime Logistics and Supply Chain Management is designed to give you state

    E-Print Network [OSTI]

    Painter, Kevin

    About Our MSc in Maritime Logistics and Supply Chain Management is designed to give you state of the art knowledge in international shipping and global logistics in addition to an excellent foundation in key supply chain management concepts and logistics practice. We have a full programme of courses, site

  1. Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST)

    E-Print Network [OSTI]

    1 Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS, Acting Chief, Computer Security Division, Information Technology Laboratory (ITL), NIST 9 Data Using Encryption Matthew Scholl, Computer Security Division, Information Technology Laboratory

  2. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  3. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  4. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  5. S. 2166: An act to reduce the Nation's dependence on imported oil, to provide for the energy security of the Nation, and for other purposes, introduced in the United States Senate and House of Representatives, One Hundred Second Congress, Second Session, February 19, 1992

    SciTech Connect (OSTI)

    Not Available

    1992-01-01T23:59:59.000Z

    This bill, also referred to as the National Energy Security Act of 1992, contains the following: Title I - Findings and purposes: Climate protection goals,least-cost energy strategy, and Director of climate protection: Title II - Definitions; Title III (none); Title IV - Fleets and alternative fuels: Alternative fuel fleets, Alternative fuels, Mass transit and training; Title V - Renewable energy: CORECT and COEECT, Renewable energy initiatives, Hydropower; Title VI - Energy efficiency: Industrial, commercial, and residential, Federal energy management, Utilities, State, local, insular, and tribal energy assistance, LIHEAP options pilot program, Consultative commission on western hemisphere energy and environment; Title VII (none); Title VIII - Advanced nuclear reactor commercialization; Title IX - Nuclear reactor licensing; Title X - Uranium: Uranium enrichment, Uranium; Title XI - Natural gas; Title XII - Outer continental shelf: Coastal communities impact assistance, Coastal resources enhancement fund, relationship to other law, Prohibition of leasing and preleasing activity; Title XIII - Research, development, demonstration and commercialization activities; Title XIV - Coal and coal technology, Electricity, Innovative technology transfer; Title XV - Public Utility Holding Company Act reform; Title XVI - Strategic Petroleum Reserve; Title XVII - Stratospheric ozone depletion; Title XVIII - Indian energy resource development commission; Title XIX - General provisions.

  6. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  7. Cyber Security

    Energy Savers [EERE]

    Programs Division IM-52 Al Gallo (Acting) Director Associate CIO for IT Policy & Governance (IM-20) LeAnn Oliver Porfolio & Analysis Division (IM-21) Robin Crisp Director...

  8. Cyber Security

    Energy Savers [EERE]

    Enterprise Services Division (IM-33) Michael Maraya Director (Acting) Associate CIO for Technology & Innovation (IM-50) Peter Tseronis Emerging Technology Division IM-51 Frank...

  9. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  13. Coupling of a regional atmospheric model (RegCM3) and a regional oceanic model (FVCOM) over the maritime continent

    E-Print Network [OSTI]

    Wei, Jun

    Climatological high resolution coupled climate model simulations for the maritime continent have been carried out using the regional climate model (RegCM) version 3 and the finite volume coastal ocean model (FVCOM) ...

  14. Privacy Act of 1974; Publication of Compilation of Privacy Act...

    Office of Environmental Management (EM)

    Privacy Act of 1974; Publication of Compilation of Privacy Act Systems of Records Privacy Act of 1974; Publication of Compilation of Privacy Act Systems of Records Privacy Act of...

  15. Supply chain security along the Columbia River : an analysis of maritime supply chain security with respect to communication between security experts

    E-Print Network [OSTI]

    Sichel, Alexander R. (Alexander Russell)

    2005-01-01T23:59:59.000Z

    The amount of cargo that enters the US border is at an all time high. Cargo containers and vessel shipments enter the US from all over the world. Tracking these shipments from their origin to destination requires professional ...

  16. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  17. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  18. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  19. Recovery Act Milestones

    ScienceCinema (OSTI)

    Rogers, Matt

    2013-05-29T23:59:59.000Z

    Every 100 days, the Department of Energy is held accountable for a progress report on the American Recovery and Reinvestment Act. Update at 200 days, hosted by Matt Rogers, Senior Advisor to Secretary Steven Chu for Recovery Act Implementation.

  20. Intergovernmental Personnel Act Assignments

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-08-24T23:59:59.000Z

    This Manual implements provisions of the Intergovernmental Personnel Act (IPA) within the Department of Energy (DOE) and establishes requirements, responsibilities, and authority for effecting assignments under the Act. Does not cancel other directives.

  1. Water Quality Act (Montana)

    Broader source: Energy.gov [DOE]

    The Water Quality Act establishes water conservation and protection, as well as the prevention, abatement, and control of water pollution, as the policy of the state of Montana. The Act establishes...

  2. Coastal Management Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

  3. ACT-ARA

    Energy Science and Technology Software Center (OSTI)

    003092IBMPC00 ACT-ARA: Code System for the Calculation of Changes in Radiological Source Terms with Time   

  4. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  7. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  8. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  9. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  10. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  11. CONSENT TO RELEASE EDUCATIONAL RECORDS I, _________________________________, Social Security Number _______________,

    E-Print Network [OSTI]

    Qiu, Weigang

    ) ____ Transcript ____ Student Information Management System (SIMS) records ____ Bursar's Receipt ____ AcademicCONSENT TO RELEASE EDUCATIONAL RECORDS I, _________________________________, Social Security Number records protected under the Family Educational Rights and Privacy Act (FERPA) as follows: 1. Records

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  15. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  16. Recovery Act Project Stories

    Broader source: Energy.gov [DOE]

    Funded by the American Recovery and Reinvestment Act, these Federal Energy Management Program (FEMP) projects exemplify the range of technical assistance provided to federal agencies.

  17. Wetlands Protection Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act establishes regulations regarding the removal, dredging, filling, and altering of land bordering waters, allowing such activity only with permits and in certain situations. Specific...

  18. Shore Protection Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Shore Protection Act is the primary legal authority for protection and management of Georgia's shoreline features including sand dunes, beaches, sandbars, and shoals, collectively known as the...

  19. Energy Monitoring Act (Canada)

    Broader source: Energy.gov [DOE]

    This act requires that every energy enterprise file with the Minister a return setting out statistics and information relating to its ownership and control; financial information; information,...

  20. Wetland Conservation Act (Minnesota)

    Broader source: Energy.gov [DOE]

    This chapter of the Minnesota Administrative Rules implements the Wetland Conservation Act of 1991, setting standards for water preservation, withdrawal, and replacement.

  1. Security Trade Control Guidelines for Academic Exchange Agreements

    E-Print Network [OSTI]

    Takada, Shoji

    Security Trade Control Guidelines for Academic Exchange Agreements at Kyoto University Committee for Security Trade Control December 28, 2012 Recent years have seen an increasing number of academic exchange globalization. Under the Foreign Exchange and Foreign Trade Act (FEFTA), which was put into effect in April 2010

  2. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  3. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  4. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  5. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  6. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  7. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  8. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  9. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  11. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  12. Maine Maritime Academy is a co-educational, public college in Castine, Maine offering 18 degree programs in engineering, management, science and

    E-Print Network [OSTI]

    Bustamante, Fabián E.

    Maine Maritime Academy is a co-educational, public college in Castine, Maine offering 18 degree.edu. Maine Maritime Academy currently seeks to fill the following position in the Loeb-Sullivan School. Appropriate research and service are required which may include Academy Committees, Department Committees

  13. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01T23:59:59.000Z

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  14. Workers Complete Y-12's Largest Recovery Act Project Ahead of...

    Office of Environmental Management (EM)

    June 15, 2011 OAK RIDGE, Tenn. - The Y-12 National Security Complex (Y-12) re- cently celebrated the early completion of its largest Recovery Act- funded project, emptying all...

  15. DOE Issues Final Rule for Section 133 of the Energy Independence Act (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-04-01T23:59:59.000Z

    This fact sheet provides a summary of the final rule under Section 133 of the Energy Independence and Security Act of 2007 (EISA) that the U.S. Department of Energy (DOE) issued in March 2014.

  16. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  17. Sandia Energy - Maritime Ports May Be the Next Deployment for Hydrogen

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand RequirementsCoatingsUltra-High-VoltagePowerUpdatesDevelopment ReferenceMaritimeFuel

  18. Recovery Act State Summaries | Department of Energy

    Energy Savers [EERE]

    Act State Memo Virgin Islands Recovery Act State Memo Washington Recovery Act State Memo West Virginia Recovery Act State Memo Wisconsin Recovery Act State Memo Wyoming Recovery...

  19. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  20. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  1. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  2. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  3. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  4. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  5. Security-by-design handbook.

    SciTech Connect (OSTI)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01T23:59:59.000Z

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  6. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect (OSTI)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01T23:59:59.000Z

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  7. Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity University of Warwick Statement on the Regulation of Investigatory Powers

    E-Print Network [OSTI]

    Davies, Christopher

    Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity 1 University of Warwick Statement on the Regulation of Investigatory Powers Act 2000: E Powers (RIP) Act as outlined below. The RIP Act statement is part of the strategic Information Security

  8. Wind Energy Act (Maine)

    Broader source: Energy.gov [DOE]

    The Maine Wind Energy Act is a summary of legislative findings that indicate the state's strong interest in promoting the development of wind energy and establish the state's desire to ease the...

  9. Public Utilities Act (Illinois)

    Broader source: Energy.gov [DOE]

    This act aims to make energy services in the state reliable and efficient, while preserving the quality if the environment. It states the duties of public utilities in terms of accounts and reports...

  10. Environmental Protection Act (Illinois)

    Broader source: Energy.gov [DOE]

    This Act states general provisions for the protection of the environment. It also states specific regulations for air, water and land pollution as well as atomic radiation, toxic chemical and oil...

  11. High Voltage Safety Act

    Broader source: Energy.gov [DOE]

    The purpose of the High Voltage Safety Act is to prevent injury to persons and property and interruptions of utility service resulting from accidental or inadvertent contact with high-voltage...

  12. Land Reclamation Act (Missouri)

    Broader source: Energy.gov [DOE]

    It is the policy of the state to balance surface mining interests with the conservation of natural resources and land preservation. This Act authorizes the Land Reclamation Commission of the...

  13. Forest Conservation Act (Maryland)

    Broader source: Energy.gov [DOE]

    The main purpose of Maryland's Forest Conservation Act is to minimize the loss of Maryland's forest resources during land development by making the identification and protection of forests and...

  14. Mississippi Public Utility Act

    Broader source: Energy.gov [DOE]

    The Mississippi Public Utility Act is relevant to any project that plans to generate energy. It requires that a utility must first obtain a Certificate of Public Convenience and Necessity (CPCN)...

  15. Radiation Management Act (Oklahoma)

    Broader source: Energy.gov [DOE]

    This Act establishes The Department of Environmental Quality as the designated official agency of the State of Oklahoma for all regulatory activities for the use of atomic energy and sources of...

  16. Healthy Air Act (Maryland)

    Broader source: Energy.gov [DOE]

    The Maryland Healthy Air Act was developed with the purpose of bringing Maryland into attainment with the National Ambient Air Quality Standards (NAAQS) for ozone and fine particulate matter by the...

  17. National Environmental Policy Act Compliance Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-10-26T23:59:59.000Z

    This Order establishes DOE internal requirements and responsibilities for implementing the National Environmental Policy Act of 1969 (NEPA), the Council on Environmental Quality Regulations Implementing the Procedural Provisions of NEPA (40 CFR Parts 1500-1508), and the DOE NEPA Implementing Procedures (10 CFR Part 1021). Chg 1 (9-28-01) reflects the Under Secretary/Administrator of the National Nuclear Security Administration (NNSA) approval of certain NNSA environmental impact statements. 9/28/2001. Chg 2 (6-25-10) reflects changes to Deputy Secretary Policy and DOE organization. Superseded by DOE O 451.1B Admin Chg 3.

  18. NO FEAR Act Notice | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAboutAdministration ToNO FEAR Act

  19. 2012 SG Peer Review - Recovery Act: Secure Interoperable Open...

    Broader source: Energy.gov (indexed) [DOE]

    Project Objective Life-cycle Funding FY10 - FY13 45.4 m Technical Scope (Insert graphic here) 2 *Integrate Legacy and Smart Grid information systems *Integrate external...

  20. Energy Independence and Security Act of 2007 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube|6721 FederalTexas Energy Incentive Programs, Texas UpdatedWyomingIndependence

  1. Freedom of Information Act (FOIA) | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHall ATours, Research Inspecting an

  2. National Environmental Policy Act (NEPA) | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1 JulyScience (SC)

  3. National Environmental Policy Act | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1 JulyScience (SC)In 1970,

  4. Truman Signs Atomic Energy Act | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron Spin Transition in2,EHSS A-Z SiteManhattanPacific: A Year inTruman Signs

  5. Privacy Act Fees and Time Limits | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica TreatyWastewants youNationalNuclearExemptions

  6. Privacy Act Links to Relates Sites | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica TreatyWastewants

  7. Privacy Act System Notices | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica TreatyWastewantsRequests | NationalSystem

  8. Nuclear Waste Policy Act Signed | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for Renewable Energy:Nanowire3627 Federal Register /76SafeguardsSystems ModelingWaste

  9. Public Health Security and Bioterrorism Preparedness and Response Act of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014, an OHASeptember 2010 |ofDepartment ofPart 1021 | DepartmentofA photo

  10. Privacy Act (PA) of 1974 | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News, informationPriority Firm Exchange . . . . . . .

  11. Privacy Act Statement | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News, informationPriority Firm Exchange . . . . .

  12. Energy Independence and Security Act of 2007 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazel Crest,EnergySerranopolis Jump to:Econ

  13. Energy Independence and Security Act of 2007 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny:RevisedAdvisoryStandard |in STEMEnergyI.ofTrack 1 Track 2 Track 3SAVERSEnergy

  14. Freedom of Information Act - Costs | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,Site OperationsAboutEnergy

  15. Freedom of Information Act Related Sites | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,Site OperationsAboutEnergyAdministration Related

  16. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  17. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  18. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  19. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  20. Office of Secure Transportation History | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica TreatyWaste Policy Act SignedSecurityOffice

  1. Office of Secure Transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica TreatyWaste Policy Act SignedSecurityOffice|

  2. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  3. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  4. Recovery Act Funds at Work

    Broader source: Energy.gov [DOE]

    Funds from the American Recovery and Reinvestment Act of 2009 (Recovery Act) are being put to work to improve safety, reliability, and service in systems across the country. Here are case studies from a variety of Recovery Act programs.

  5. Massachusetts Clean Air Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    The Act contains regulations to prevent the pollution and contamination of the atmosphere. The Act establishes a contiguous metropolitan pollution control district, comprised of towns in the...

  6. Coastal Marshlands Protection Act (Georgia

    Broader source: Energy.gov [DOE]

    The Coastal Marshlands Protection Act provides the Coastal Resources Division with the authority to protect tidal wetlands. The Coastal Marshlands Protection Act limits certain activities and...

  7. Environmental Protection Act (Ontario, Canada)

    Broader source: Energy.gov [DOE]

    The Environmental Protection Act is Ontario's key legislation for environmental protection. The act grants the Ministry of the Environment broad powers to deal with the discharge of contaminants...

  8. Recovery Act State Memos Kentucky

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    * KENTUCKY RECOVERY ACT SNAPSHOT Kentucky has substantial natural resources, including coal, oil, gas, and hydroelectric power. The American Recovery & Reinvestment Act (ARRA)...

  9. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  10. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  11. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  12. ARM - Recovery Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Become a UsergovAboutRecovery Act Recovery Act Logo

  13. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  14. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  15. Statement of Neile L. Miller Acting Undersecretary for Nuclear Security and Acting Administrator

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica HighSTARTOperationsInformationStatement of

  16. Small Business Administration Recovery Act Implementation | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Small Business Administration Recovery Act Implementation Small Business Administration Recovery Act Implementation Small Business Administration Recovery Act Implementation Small...

  17. Recovery Act State Memos Montana

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... 5 RECOVERY ACT SUCCESS STORIES - ENERGY EMPOWERS * Green power transmission line given new life ......

  18. ReACT Methodology Proof of Concept Final Report

    SciTech Connect (OSTI)

    Bri Rolston; Sarah Freeman

    2014-03-01T23:59:59.000Z

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) funded INL Researchers to evaluate a novel process for assessing and mitigating cyber security risks. The proof of concept level of the method was tested in an industry environment. This case study, plus additional case studies will support the further development of the method into a tool to assist industry in securing their critical networks. This report provides an understanding of the process developed in the Response Analysis and Characterization Tool (ReACT) project. This report concludes with lessons learned and a roadmap for final development of these tools for use by industry.

  19. An analysis of Pre-Columbian balsa raft design to determine the suitability of such rafts for ancient maritime trade between Ecuador and Mexico

    E-Print Network [OSTI]

    Dewan, Leslie

    2007-01-01T23:59:59.000Z

    By approximately 100 BCE Ecuadorian traders had established extensive maritime commercial routes reaching from Chile to Colombia. Historical sources indicate that they transported their merchandise in large, ocean-going ...

  20. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  1. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  2. Recovery Act Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection RadiationRecord-Setting Microscopy IlluminatesHandbookRODs Sign Act

  3. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  4. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  5. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  6. NIST Organic Act National Institute of Standards and Technology Act

    E-Print Network [OSTI]

    Magee, Joseph W.

    NIST Organic Act National Institute of Standards and Technology Act SECTION 1. FINDINGS in manufacturing technology, quality control, and techniques for ensuring product reliability and cost concerns compete strongly in world markets. (3) Improvements in manufacturing and product technology depend

  7. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  8. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  9. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  10. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  11. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  12. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  13. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  14. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  15. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  16. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  17. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  18. Pollution Control Act (South Carolina)

    Broader source: Energy.gov [DOE]

    This Act declares the maintenance of reasonable standards of purity of air and water to be the public policy of the state. The Act authorizes the Department of Health and Environmental Control to...

  19. Solid Waste Act (New Mexico)

    Broader source: Energy.gov [DOE]

    The main purpose of the Solid Waste Act is to authorize and direct the establishment of a comprehensive solid waste management program. The act states details about specific waste management...

  20. Montana Radon Control Act (Montana)

    Broader source: Energy.gov [DOE]

    The Radon Control Act regulates the emission of radon, the gaseous decay products of uranium or thorium. The Act addresses operator certification of radon-producing facilities, testing and...

  1. Recovery Act State Memos Oregon

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are being used to hire or retrain staff, building in-house expertise in the areas of smart grids, critical energy infrastructure interdependencies and cyber-security. * Oregon...

  2. Recovery Act State Memos Texas

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are being used to hire or retrain staff, building in-house expertise in the areas of Smart Grids, critical energy infrastructure interdependencies and cyber-security....

  3. Recovery Act State Memos Louisiana

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are being used to hire or retrain staff in, building in- house expertise in the areas of Smart Grids, critical energy infrastructure interdependencies and cyber-security. *...

  4. Recovery Act State Memos Pennsylvania

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are being used to hire or retrain staff in building in-house expertise in the areas of Smart Grids, critical energy infrastructure interdependencies and cyber- security. * City...

  5. Recovery Act State Memos Mississippi

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are being used to hire or retrain staff, building in-house expertise in the areas of Smart Grids, critical energy infrastructure interdependencies and cyber-security....

  6. Recovery Act State Memos Vermont

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    million under the Smart Grid Investment Grant program to expand the deployment of Vermont smart meters, implement customer systems, secure control systems for substations and...

  7. ARM - Recovery Act Instruments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadap Documentation TDMADAP :ProductsVaisala CL51Instruments Related Links RHUBC-IIActRecovery Act

  8. Recovery Act State Memos Nebraska

    Energy Savers [EERE]

    ... 6 RECOVERY ACT SUCCESS STORIES - ENERGY EMPOWERS * Biofuels company builds new facility in Nebraska ... 7 * Nebraska appliance rebate...

  9. Recovery Act State Memos Arkansas

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6 RECOVERY ACT SUCCESS STORIES - ENERGY EMPOWERS * Program finds unique way to fund energy upgrades ... 7 * Green collar courses ......

  10. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  11. Ganging up on Jolly Roger in Asia : International cooperation and maritime piracy

    E-Print Network [OSTI]

    He, Ruijie

    2008-01-01T23:59:59.000Z

    As non-traditional security threats such as terrorism and organized transnational crime gain greater prominence around the globe, the need for international cooperation against these non-state actors has consequently ...

  12. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  13. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  14. Cooperative Monitoring Center Occasional Paper/18: Maritime Cooperation Between India and Pakistan: Building Confidence at Sea

    SciTech Connect (OSTI)

    SIDDIQA-AGHA,AYESHA

    2000-11-01T23:59:59.000Z

    This paper discusses ways in which the navies of both India and Pakistan can cooperate on issues of maritime and naval significance. Although the militaries and navies of the two countries have traditionally seen each other as rivals, international economic developments make cooperation imperative. South Asia requires an approach that can alter the existing hostile images and perceptions. This can be achieved through developing an incremental approach towards confidence building that would allow consistency and help build confidence gradually. The aim is to make confidence building a sustainable activity that would help transform hostile images and build cooperative and nonhostile relationships. This paper proposes a five-step model to suggest what the two navies can do jointly to build confidence, with the ultimate goal of naval arms control. The steps include (1) the Signaling Stage to initiate communication between the two navies, (2) the Warming-Up Stage to build confidence through nonmilitary joint ventures, (3) the Handshake Stage to build confidence between the two navies through military joint ventures, (4) the Problem-Solving Stage to resolve outstanding disputes, and (5) the Final Nod Stage to initiate naval arms control. This model would employ communication, navigation, and remote sensing technologies to achieve success.

  15. Cloud Service Security Requirements Questionnaire 1. What Cloud service will you be providing

    E-Print Network [OSTI]

    /docs/Exhibit-G/exhibit-g-definitions-acronyms-green.pdf 3. Has the information system been certified for Federal Information Security Management Act (FISMA for security and quality control? If so, please provide evidence. 5. Has your cloud service been industry have a current Configuration Management Plan? If so, please provide evidence. 7. Do you have a current

  16. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  17. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  18. Recovery Act Recipient Data | Department of Energy

    Office of Environmental Management (EM)

    Recovery Act Recipient Data Recovery Act Recipient Data A listing of all Recovery Act recipients and their allocations. Updated weekly. recoveryactfunding.xls More Documents &...

  19. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  20. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  1. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  2. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  3. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  4. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  5. Security and Use Control of Nuclear Explosives and Nuclear Weapons

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-01-22T23:59:59.000Z

    This Order establishes requirements to implement the nuclear explosive security and use control elements of DOE O 452.1D, Nuclear Explosive and Weapon Surety (NEWS) Program, to ensure authorized use, when directed by proper authority, and protect against deliberate unauthorized acts/deliberate unauthorized use. Cancels DOE O 452.4A.

  6. Security and Use Control of Nuclear Explosives and Nuclear Weapons

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-11-19T23:59:59.000Z

    The Order establishes requirements to implement the nuclear explosive security and use control (UC) elements of DOE O 452.1D, Nuclear Explosive and Weapon Surety (NEWS) Program, to ensure authorized use, when directed by proper authority, and protect against deliberate unauthorized acts (DUAs), deliberate unauthorized use (DUU), and denial of authorized use (DAU).

  7. Administrator Highlights U.S.-Georgian Nuclear Security Cooperation in Tbilisi

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01T23:59:59.000Z

    NNSA Administrator Thomas D'Agostino highlighted the strong U.S.-Georgian cooperation on nuclear security issues during a day-long visit to the Republic of Georgia in mid-June. He briefed the media at availability at the Tbilisi airport. In April 2009, President Obama outlined an ambitious agenda to secure vulnerable nuclear material around the world within four years, calling the danger of a terrorist acquiring nuclear weapons "the most immediate and extreme threat to global security." In this year's State of the Union, he called the threat of nuclear weapons, "the greatest danger to the American people." In order to meet that challenge, the President's FY2011 Budget Request includes close to $2.7 billion for the National Nuclear Security Administration's Defense Nuclear Nonproliferation program -- an increase of 25.7 percent over FY2010. Included in that request is NNSA's Second Line of Defense (SLD) program, which works around the world to strengthen the capability of foreign governments to deter, detect, and interdict illicit trafficking in nuclear and other radioactive materials across international borders and through the global maritime shipping system.

  8. Administrator Highlights U.S.-Georgian Nuclear Security Cooperation in Tbilisi

    SciTech Connect (OSTI)

    Thomas D'Agostino

    2010-07-16T23:59:59.000Z

    NNSA Administrator Thomas D'Agostino highlighted the strong U.S.-Georgian cooperation on nuclear security issues during a day-long visit to the Republic of Georgia in mid-June. He briefed the media at availability at the Tbilisi airport. In April 2009, President Obama outlined an ambitious agenda to secure vulnerable nuclear material around the world within four years, calling the danger of a terrorist acquiring nuclear weapons "the most immediate and extreme threat to global security." In this year's State of the Union, he called the threat of nuclear weapons, "the greatest danger to the American people." In order to meet that challenge, the President's FY2011 Budget Request includes close to $2.7 billion for the National Nuclear Security Administration's Defense Nuclear Nonproliferation program -- an increase of 25.7 percent over FY2010. Included in that request is NNSA's Second Line of Defense (SLD) program, which works around the world to strengthen the capability of foreign governments to deter, detect, and interdict illicit trafficking in nuclear and other radioactive materials across international borders and through the global maritime shipping system.

  9. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  10. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  11. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  12. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  13. Double acting bit holder

    DOE Patents [OSTI]

    Morrell, Roger J. (Blommington, MN); Larson, David A. (Minneapolis, MN); Ruzzi, Peter L. (Eagan, MN)

    1994-01-01T23:59:59.000Z

    A double acting bit holder that permits bits held in it to be resharpened during cutting action to increase energy efficiency by reducing the amount of small chips produced. The holder consist of: a stationary base portion capable of being fixed to a cutter head of an excavation machine and having an integral extension therefrom with a bore hole therethrough to accommodate a pin shaft; a movable portion coextensive with the base having a pin shaft integrally extending therefrom that is insertable in the bore hole of the base member to permit the moveable portion to rotate about the axis of the pin shaft; a recess in the movable portion of the holder to accommodate a shank of a bit; and a biased spring disposed in adjoining openings in the base and moveable portions of the holder to permit the moveable portion to pivot around the pin shaft during cutting action of a bit fixed in a turret to allow front, mid and back positions of the bit during cutting to lessen creation of small chip amounts and resharpen the bit during excavation use.

  14. Recovery Act | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    three Recovery Act-funded Smart Grid Investment Grant (SGIG) projects. February 28, 2014 Smart Meter Investments Yield Positive Results in Maine Central Maine Power's (CMP) SGIG...

  15. Coal Mine Safety Act (Virginia)

    Broader source: Energy.gov [DOE]

    This Act is the primary legislation pertaining to coal mine safety in Virginia. It contains information on safety rules, safety standards and required certifications for mine workers, prohibited...

  16. Green Energy Act (Ontario, Canada)

    Broader source: Energy.gov [DOE]

    The Green Energy Act was created to expand Ontario's production of renewable energy, encourage energy conservation and promote the creation of clean-energy green jobs.

  17. Montana Dam Safety Act (Montana)

    Broader source: Energy.gov [DOE]

    This Act establishes the state's interest in the construction of dams for water control and regulation and for hydropower generation purposes. It regulates dam construction, operation, and...

  18. Water Pollution Control Act (Minnesota)

    Broader source: Energy.gov [DOE]

    This Act gives the Minnesota Pollution Control Agency broad responsibility to establish pollution standards for state waters; monitor water conditions and sources of pollution; review construction,...

  19. Solid Waste Management Act (Pennsylvania)

    Broader source: Energy.gov [DOE]

    This Act provides for the planning and regulation of solid waste storage, collection, transportation, processing, treatment, and disposal. It requires that municipalities submit plans for municipal...

  20. Massachusetts Clean Waters Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act establishes a Division of Water Pollution Control within the Massachusetts Department of Environmental Protection. The Division is responsible for establishing a program for the prevention...

  1. Georgia Hazardous Waste Management Act

    Broader source: Energy.gov [DOE]

    The Georgia Hazardous Waste Management Act (HWMA) describes a comprehensive, Statewide program to manage hazardous wastes through regulating hazardous waste generation, transportation, storage,...

  2. Water Quality Control Act (Tennessee)

    Broader source: Energy.gov [DOE]

    The Water Quality Control Act (WQCA) establishes the water pollution control program. The WQCA identifies the responsibilities and extent of authority for the Commissioner of the Water Quality...

  3. Recovery Act State Memos Florida

    Energy Savers [EERE]

    of renewable energy. The Florida Energy and Climate Commission has awarded the Florida Solar Energy Center (FSEC) 10 million in Recovery Act money, enabling the center to set...

  4. Ground Water Management Act (Virginia)

    Broader source: Energy.gov [DOE]

    Under the Ground Water Management Act of 1992, Virginia manages ground water through a program regulating the withdrawals in certain areas called Ground Water Management Areas (GWMA). Currently,...

  5. Florida Coastal Management Act (Florida)

    Broader source: Energy.gov [DOE]

    This Act is intended to provide for the development of natural, commercial, recreational, ecological, industrial, and aesthetic resources, including, but not limited to, energy facilities, of...

  6. Montana Environmental Policy Act (Montana)

    Broader source: Energy.gov [DOE]

    The Montana Environmental Policy Act aims to provide for the consideration of environmental impacts by the legislature when enacting laws, and for public transparency regarding the possible...

  7. Hazardous Sites Cleanup Act (Pennsylvania)

    Broader source: Energy.gov [DOE]

    This Act tasks the Pennsylvania Department of Environmental Protection with regulating hazardous waste. The department is charged with siting, review, permitting and development of hazardous waste...

  8. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  9. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  10. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  11. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  12. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  13. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  14. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  15. Freedom of Information Act FOIA 10CFR

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Freedom of Information Act Freedom of Information Act Regulations Code of Federal Regulations (CFR) for the Freedom of Information Act is 10 CFR 1004 THE FREEDOM OF INFORMATION ACT...

  16. Recovery Act State Memos Iowa

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are being used to hire or retrain staff in, building in-house expertise in the areas of Smart Grids, critical energy infrastructure interdependencies and cyber-security. * Iowa...

  17. Recovery Act State Memos Kansas

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    is being used to hire or retrain staff in, building in-house expertise in the areas of Smart Grids, critical energy infrastructure interdependencies and cyber-security. * City...

  18. National Environmental Policy Act (NEPA) Categorically Excluded...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental Management System NEPA National Environmental Policy Act (NEPA) Categorically Excluded Actions National Environmental Policy Act (NEPA) Categorically Excluded...

  19. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  20. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  1. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  2. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  3. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  5. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  6. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  7. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  9. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  10. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  11. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  12. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  13. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  14. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  15. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  16. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27T23:59:59.000Z

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  17. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  18. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  19. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  20. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  1. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  2. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  3. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  4. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  5. Texas Clean Air Act (Texas)

    Broader source: Energy.gov [DOE]

    This Act is designed to safeguard the state's air resources from pollution by requiring the control and abatement of air pollution and emissions of air contaminants, consistent with the protection...

  6. Tennessee Air Quality Act (Tennessee)

    Broader source: Energy.gov [DOE]

    The Tennessee Air Quality Act (AQA) delegates the power to maintain air quality in the State to the Department of Environment and Conservation. Under the Department of the Environment and...

  7. Renewable Energy Act (New Mexico)

    Broader source: Energy.gov [DOE]

    The purposes of the Renewable Energy Act are to prescribe the amounts of renewable energy resources that public utilities shall include in their electric energy supply portfolios for sales to...

  8. Water Quality Act (New Mexico)

    Broader source: Energy.gov [DOE]

    This act establishes the Water Quality Control Commission and states the powers and duties of the commission. Rules are stated for adoption of regulations and standards and information is provided...

  9. Nuclear Decommissioning Financing Act (Maine)

    Broader source: Energy.gov [DOE]

    The Nuclear Decommissioning Financing Act calls for the establishment of a tax-exempt, tax-deductible decommissioning fund by the licensee of any nuclear power generating facility to pay for the...

  10. Georgia Radiation Control Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Georgia Radiation Control Act is designed to prevent any associated harmful effects upon the environment or the health and safety of the public through the institution and maintenance of a...

  11. Toxic Pollution Prevention Act (Illinois)

    Broader source: Energy.gov [DOE]

    It is the purpose of this Act to reduce the disposal and release of toxic substances which may have adverse and serious health and environmental effects, to promote toxic pollution prevention as...

  12. Toxics Use Reduction Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act, revised significantly in 2006, seeks to mitigate the use of toxic substances and the production of toxic byproducts through reporting requirements as well as resource conservation plans...

  13. Montana Hazardous Waste Act (Montana)

    Broader source: Energy.gov [DOE]

    This Act addresses the safe and proper management of hazardous wastes and used oil, the permitting of hazardous waste facilities, and the siting of facilities. The Department of Environmental...

  14. Efficient Use of Energy Act

    Broader source: Energy.gov [DOE]

    The Efficient Use of Energy Act of 2005 allows public electric and natural gas utilities to implement cost-effective energy-reduction programs. The programs may be funded through a tariff rider for...

  15. Delaware Land Protection Act (Delaware)

    Broader source: Energy.gov [DOE]

    The Land Protection Act requires the Department of Natural Resources and Environmental Control to work with the Delaware Open Space Council to develop standards and criteria for determining the...

  16. Coastal Facilities Review Act (Maryland)

    Broader source: Energy.gov [DOE]

    This Act aims to preserve Maryland's coastal areas and to balance competing demands for resources by requiring environmental impact evaluations to be conducted prior to the approval of the...

  17. Niobrara Scenic River Act (Nebraska)

    Broader source: Energy.gov [DOE]

    This act establishes the Niobrara Council, to assist in all aspects of the management of the Niobrara scenic river corridor and promulgate rules and regulations related to the preservation of the...

  18. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  19. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  20. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  1. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  3. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  5. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  6. Steganography Based Seaport Security Communication Yair Wiseman1

    E-Print Network [OSTI]

    Wiseman, Yair

    of a port; however, there is no cybersecurity standard for the maritime industry or for enforcement agencies, sewer, fire or other emergency reactions. In addition, ports share data with authorities and the private attention. There are no cybersecurity standards for the maritime industry or for enforcement agencies

  7. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  8. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  9. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  10. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  11. Georgia Water Quality Control Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Georgia Water Quality Control Act (WQCA) is a set of environmental regulations and permitting requirements that comply with the federal Clean Water Act. The Georgia Water Quality Control Act...

  12. Arbeidslivets lover Act relating to working environment,

    E-Print Network [OSTI]

    Johansen, Tom Henning

    Arbeidslivets lover Act relating to working environment, working hours and employment protection, etc. (Working Environment Act). as subsequently amended, last by the Act of 14. December 2012 No. 80.notification................................................................... 6 Chapter 3. Working environment measures..................................... 6 Section.3

  13. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  14. James Fenimore Cooper's use of fact in maritime fiction: a reexamination of his literary theory

    E-Print Network [OSTI]

    Moy, Deborah Lynn

    1984-01-01T23:59:59.000Z

    of the beast from the deep. The villagers' attack on the whale verges on unintentional comedy. Scott begins with a "council of experienced harpooners" deciding that the first task is to secure the whale so that it cannot escape with the rising tide. As a... suitable position, but, rising in his energy, hurled his grasp with all his force against the unfortunate monster" (PIR, Part I, p. 215). 'Ihe whale hit by the farmer's spear awakens from his inactivity and complicates matters for the whale hunters...

  15. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  16. GEORGIA RECOVERY ACT SNAPSHOT | Department of Energy

    Energy Savers [EERE]

    ACT SNAPSHOT Georgia has substantial natural resources, including biomass and hydroelectric power .The American Recovery & Reinvestment Act (ARRA) is making a meaningful down...

  17. Kathleen Carlson Appointed Interim Acting Deputy Administrator...

    National Nuclear Security Administration (NNSA)

    Interim Acting Deputy Administrator for Defense Programs Press Release Aug 16, 2001 Kathleen Carlson Appointed Interim Acting Deputy Administrator for Defense Programs...

  18. Safety of Dams and Reservoirs Act (Nebraska)

    Broader source: Energy.gov [DOE]

    This act regulates dams and associated reservoirs to protect health and public safety and minimize adverse consequences associated with potential dam failure. The act describes the responsibilities...

  19. Virginia Electric Utility Regulation Act (Virginia)

    Broader source: Energy.gov [DOE]

    The Virginia Electric Utility Regulation Act constitutes the main legislation in Virginia that pertains to the regulation of the state's electric utilities. The Act directs the State Corporation...

  20. ARKANSAS RECOVERY ACT SNAPSHOT | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ARKANSAS RECOVERY ACT SNAPSHOT Arkansas has substantial natural resources, including gas, oil, wind, biomass, and hydroelectric power. The American Recovery & Reinvestment Act...

  1. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  2. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  3. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  4. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  5. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  6. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  7. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  8. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  9. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  10. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  11. Recovery Act | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSAR -Department of Energy Recovery ActCategoryRecovery Act

  12. US public perspectives on security :

    SciTech Connect (OSTI)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.

    2012-02-01T23:59:59.000Z

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  13. Wireless sensor systems for sense/decide/act/communicate.

    SciTech Connect (OSTI)

    Berry, Nina M.; Cushner, Adam; Baker, James A.; Davis, Jesse Zehring; Stark, Douglas P.; Ko, Teresa H.; Kyker, Ronald D.; Stinnett, Regan White; Pate, Ronald C.; Van Dyke, Colin; Kyckelhahn, Brian

    2003-12-01T23:59:59.000Z

    After 9/11, the United States (U.S.) was suddenly pushed into challenging situations they could no longer ignore as simple spectators. The War on Terrorism (WoT) was suddenly ignited and no one knows when this war will end. While the government is exploring many existing and potential technologies, the area of wireless Sensor networks (WSN) has emerged as a foundation for establish future national security. Unlike other technologies, WSN could provide virtual presence capabilities needed for precision awareness and response in military, intelligence, and homeland security applications. The Advance Concept Group (ACG) vision of Sense/Decide/Act/Communicate (SDAC) sensor system is an instantiation of the WSN concept that takes a 'systems of systems' view. Each sensing nodes will exhibit the ability to: Sense the environment around them, Decide as a collective what the situation of their environment is, Act in an intelligent and coordinated manner in response to this situational determination, and Communicate their actions amongst each other and to a human command. This LDRD report provides a review of the research and development done to bring the SDAC vision closer to reality.

  14. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  15. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  16. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  17. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  18. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  19. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  20. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  1. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  2. China's Pathways to Energy Security 

    E-Print Network [OSTI]

    Beard, Steven; Caruana, Craig; Coats, Charles; Haguewood, Robert; Lee, Jong-Hwan; Morgan, Broderick; Murray, Joshua; Riedell, Michael

    2010-01-01T23:59:59.000Z

    from maritime border disputes. As oil pie shrinks, pressure to exploit disputed resources grows Tagp reduces availability by making region dependant on certain suppliers Could see a situation like russia w/ gas cutoffs . Less diversity & pipelines.... Current global liquid reserves are estimated to be about 1,342 billion barrels, with 56% located in the Middle East. 75% of the world’s natural gas reserves exist in the Middle East and Eurasia (Russia, Iran, and Qatar hold 57%). EIA 2009 Pg, 31. Only...

  3. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  4. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  5. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  6. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  7. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  8. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  9. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  10. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  11. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  12. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  13. Universitt Potsdam, 21.11.2013 Marie Sklodowska Curie Actions in

    E-Print Network [OSTI]

    Potsdam, Universität

    , marine and maritime and inland water research and bioeconomy 3. Secure, clean and efficient energy 4

  14. Research Infrastructures in Horizon 2020

    E-Print Network [OSTI]

    Schettini, Raimondo

    , sustainable agriculture, marine - maritime research, bio-economy Secure, clean and efficient energy Smart

  15. Horizon 2020: Excellent Science

    E-Print Network [OSTI]

    De Cindio, Fiorella

    agriculture, marine and maritime research & the bioeconomy Secure, clean and efficient energy Smart, green

  16. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  17. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  18. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  19. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  20. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  1. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  2. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  3. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  4. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  5. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  6. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  7. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  8. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  9. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  10. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  11. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  12. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  13. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  14. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  15. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  16. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  17. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  18. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  19. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  20. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  1. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  3. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  4. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  5. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  6. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  7. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  8. EVALUATING THE SENSITIVITY OF RADIONUCLIDE DETECTORS FOR CONDUCTING A MARITIME ON-BOARD SEARCH USING MONTE CARLO SIMULATION IMPLEMENTED IN AVERT

    SciTech Connect (OSTI)

    Harris, S; Dave Dunn, D

    2009-03-01T23:59:59.000Z

    The sensitivity of two specific types of radionuclide detectors for conducting an on-board search in the maritime environment was evaluated using Monte Carlo simulation implemented in AVERT{reg_sign}. AVERT{reg_sign}, short for the Automated Vulnerability Evaluation for Risk of Terrorism, is personal computer based vulnerability assessment software developed by the ARES Corporation. The sensitivity of two specific types of radionuclide detectors for conducting an on-board search in the maritime environment was evaluated using Monte Carlo simulation. The detectors, a RadPack and also a Personal Radiation Detector (PRD), were chosen from the class of Human Portable Radiation Detection Systems (HPRDS). Human Portable Radiation Detection Systems (HPRDS) serve multiple purposes. In the maritime environment, there is a need to detect, localize, characterize, and identify radiological/nuclear (RN) material or weapons. The RadPack is a commercially available broad-area search device used for gamma and also for neutron detection. The PRD is chiefly used as a personal radiation protection device. It is also used to detect contraband radionuclides and to localize radionuclide sources. Neither device has the capacity to characterize or identify radionuclides. The principal aim of this study was to investigate the sensitivity of both the RadPack and the PRD while being used under controlled conditions in a simulated maritime environment for detecting hidden RN contraband. The detection distance varies by the source strength and the shielding present. The characterization parameters of the source are not indicated in this report so the results summarized are relative. The Monte Carlo simulation results indicate the probability of detection of the RN source at certain distances from the detector which is a function of transverse speed and instrument sensitivity for the specified RN source.

  9. Clean Air Act. Revision 5

    SciTech Connect (OSTI)

    Not Available

    1994-02-15T23:59:59.000Z

    This Reference Book contains a current copy of the Clean Air Act, as amended, and those regulations that implement the statute and appear to be most relevant to DOE activities. The document is provided to DOE and contractor staff for informational purposes only and should not be interpreted as legal guidance. This Reference Book has been completely revised and is current through February 15, 1994.

  10. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  11. FY 2008 E-Government Act Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8 E-Government Act Report FY 2008 E-Government Act Report FY 2008 E-Government Act Report FY 2008 E-Government Act Report More Documents & Publications FY 2008 E-Government Act...

  12. an Recovery and Reinvestment Act of 20091 (Recovery Act) provides protections for cert

    E-Print Network [OSTI]

    Tam, Tin-Yau

    ors, subcontractors, grantees, or professional membership organizations acting in the interest ry Act vernmen ctors, sububbbbbcoonttraactctorors,s,s,s,s grantees, or proofofofofofesesesessisisis

  13. DOE Policy Re Recovery Act Recipient Use of Recovery Act Logos on Signage

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy (“DOE”) policy regarding use of the Recovery Act logo by Recovery Act recipients and subgrantees.

  14. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  16. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  17. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  18. NH Acid Rain Control Act (New Hampshire)

    Broader source: Energy.gov [DOE]

    The Act is implemented under New Hampshire's acid deposition control program established under the Rules to Control Air Pollution in Chapter Env-A 400. The goal of the Act is to reduce emissions...

  19. Georgia Hazardous Site Response Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Georgia Hazardous Site Response Act is Georgia’s version of Superfund. The Act provides for graduated fees on the disposal of hazardous waste, a trust fund to enable the EPD to clean up or plan...

  20. Clean Air Act Amendments of 1990

    E-Print Network [OSTI]

    Hanneschlager, R. E.

    Congress is currently debating amendments to the Clean Air Act which would strengthen and enhance the current Clean Air Act. The bill would guarantee a reduction of 10 million tons of sulfur dioxide from 1980 levels; would sharply reduce pollutants...

  1. Lakes and Rivers Improvement Act (Ontario, Canada)

    Broader source: Energy.gov [DOE]

    The Lakes and Rivers Improvement Act proscribes the management, protection, preservation and use of the waters of the lakes and rivers of Ontario and the land under them. The Act also details...

  2. Public Waterfront Act- Chapter 91 (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act contains a number of regulations regarding the construction of structures and other activity near rivers, streams, harbors, and tidelands. Regulations pertaining to this Act can be found...

  3. District of Columbia Recovery Act State Memo

    Broader source: Energy.gov [DOE]

    The American Recovery & Reinvestment Act (ARRA) is making a meaningful down payment on the nation’s energy and environmental future. The Recovery Act investments in the District of Columbia...

  4. NH Clean Power Act (New Hampshire)

    Broader source: Energy.gov [DOE]

    The Act calls for annual reductions of multiple pollutants, including SO2, Nox, CO2, and mercury. The Act calls for an 87% reduction in SO2 emissions and a 70% reduction in Nox emissions from...

  5. Recovery Act State Memos New Jersey

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are being used to hire or retrain staff, building in-house expertise in the areas of Smart Grids, critical energy infrastructure interdependencies and cyber-security....

  6. Recovery Act State Memos Washington, DC

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are being used to hire or retrain staff in, building in-house expertise in the areas of Smart Grids, critical energy infrastructure interdependencies and cyber-security. *...

  7. Recovery Act State Memos North Carolina

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are being used to hire or retrain staff, building in-house expertise in the areas of Smart Grids, critical energy infrastructure interdependencies and cyber-security. * North...

  8. Recovery Act State Memos North Dakota

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are being used to hire or retrain staff, building in-house expertise in the areas of Smart Grids, critical energy infrastructure interdependencies and cyber-security....

  9. Recovery Act State Memos South Carolina

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are being used to hire or retrain staff, building in-house expertise in the areas of Smart Grids, critical energy infrastructure interdependencies and cyber-security....

  10. Clean Air Act, Section 309

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T, Inc.'sEnergyTexas1. FeedstockCLEAN AIR ACT § 309* §7609. Policy review (a)

  11. Williamson Act | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown ofNationwideWTEDBird, Idaho:Wildwood Crest, NewKansas:Williams,Florida:ActLegal

  12. WIPP - Privacy Act of 1974

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >Internship Program TheSiteEureka Analytics andWFRNewsWindPrivacy Act

  13. Recovery Act | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015 < prevQuick Guide:U.N.June 8,Past Opportunities » Recovery Act

  14. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  15. Sandia National Laboratories: Recovery Act (ARRA) Projects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    with: ARRA * awardees * contractors * DOE * Energy * Grid Integration * Partnership * photovoltaic * Photovoltaics * PV * Recovery Act * reliability * Renewable Energy * SAND...

  16. Energy Employees' Occupational Illness Compensation Program Act...

    Energy Savers [EERE]

    Employees' Occupational Illness Compensation Program Act (EEOICPA) Tracking Database, INL Energy Employees' Occupational Illness Compensation Program Energy Employees' Occupational...

  17. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  18. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  19. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  20. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  1. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  2. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  3. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprise’s

  4. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  5. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  6. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  7. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  8. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect (OSTI)

    None

    2009-10-01T23:59:59.000Z

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

  9. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    limit economic development, impact interdependent infrastructure (such as energy and agriculture), and are a fundamental source of ... Climate Security On May 13, 2011, in...

  10. Pollux | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Pollux | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  11. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  12. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  13. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from improved climate models to performance models for underground waste storage to 3D printing and digital rock physics. Marianne Walck (Director ... Recent Sandia Secure,...

  14. Sandia National Laboratories: Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    States. I&C systems monitor the safe, reliable and secure generation and delivery of electricity and could have potential cyber vulnerabilities. At Sandia National Laboratories,...

  15. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  16. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  17. McMaster Security Services Annual Report 2009 1 Security Services

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services ­ Annual Report 2009 1 McMaster Security Services Annual Report 2009 #12;McMaster Security Services ­ Annual Report 2009 2 Mission Statement Developing a safe and secure to the Security Services Department. Methods and approaches to assist in achieving a safe and secure environment

  18. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  19. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAbout Us

  20. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1Resource forNational Cyber Security

  1. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8, 2000Consumption Survey (CBECS)Laboratory to HighlightSecurity Overview

  2. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuring

  3. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22, 2014SEC.

  4. Homeland Security Programs | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School football Highdefault Sign In About |PagesHomeland Security

  5. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  6. Clean Air Act General Conformity Requirements and the National...

    Broader source: Energy.gov (indexed) [DOE]

    Clean Air Act General Conformity Requirements and the National Environmental Policy Act Process Clean Air Act General Conformity Requirements and the National Environmental Policy...

  7. Annual Security Report October 1, 2013

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2013 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................4 MESSAGE FROM THE EINSTEIN SECURITY DEPARTMENT

  8. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  9. A Survey on Cloud Provider Security

    E-Print Network [OSTI]

    A Survey on Cloud Provider Security Measures Alex Pucher, Stratos Dimopoulos Abstract Cloud take advantage of this model already, but security and privacy concerns limit the further adoption agencies and start offering security certifications and separate tightly controlled "government" cloud

  10. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses (not Reactors appropriations including the National Nuclear Security Administration field offices. This account

  11. Annual Security Report October 1, 2012

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2012 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................3 MESSAGE FROM THE SECURITY DEPARTMENT

  12. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses, and Naval Reactors appropriations including the National Nuclear Security Administration (NNSA) field of

  13. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision technology needs of the University. The Information Technology Security Office has created this Incident, affiliates, or students. Audience This document is primarily for University departmental information security

  14. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    June 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute the security of their information tech nology (IT) systems. Whether they get this assistance from internal

  15. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Computer Security Division Information Technology Laboratory National Institute of Standards

  16. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  17. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  18. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  19. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  20. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.