Powered by Deep Web Technologies
Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Agentc: Agent-based system for securing maritime transit  

E-Print Network (OSTI)

Recent rise in maritime piracy prompts the search for novel techniques for addressing the problem. We therefore developed AgentC, a prototype system that demonstrates how agent-based traffic management techniques can be used to improve the security of transit through piracy-affected areas. Combining agent-based modeling and simulation of maritime traffic and novel route planning and vessel scheduling techniques, the system shows the promising potential of agent-based methods for increasing maritime security. Real-world data sources Control and presentation interface (Google Earth) Route planning and scheduling Optimum group transit formation Maritime traffic simulation Maritime environment model Randomized transit routing FSM-based vessel behavior models Optimum transit patrolling Inter-agent communication channels

Michal Jakob; Branislav Boansk; Michal P?chou?ek

2011-01-01T23:59:59.000Z

2

Federal Information Security Management Act (FISMA) ...  

Science Conference Proceedings (OSTI)

Federal Information Security Management Act (FISMA) Implementation Project. Summary: The FISMA Implementation Project ...

2013-01-15T23:59:59.000Z

3

PACFEST 2004 : enabling technologies for maritime security in the Pacific region.  

SciTech Connect

In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

2005-06-01T23:59:59.000Z

4

The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms  

E-Print Network (OSTI)

ABSTRACT The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms. (May 2013) Jonathan Stone Department of Maritime Administration Texas A&M University Research Advisor: Dr. Joan Mileski Department of Maritime Administration Prior research has addressed European Union (EU) water transportation policy and its impact on firm strategy. We extend this research by attempting to measure the effect of port security regulation compliance implementation on the perceived competitiveness of maritime firms located in European Union ports. We ask the question: Can firm specific implementation of required port security compliance enhance or hinder a firms competitive advantage? We use Resource-Based Strategic Theory as a framework for evaluating competitiveness. Resource based theory purports that assets and systems can give a firm a competitive advantage if they follow the VRIN criteria of Valuable, Rare, Inimitable, and Not easily substitutable. We ask via email and snail mail survey instrument whether certain security assets, resources and systems are VRIN and whether these assets, resources and systems give competitive advantage to the firm. The type of resources/assets/systems include physical assets such as fencing; ongoing management assets such as communication systems, planning and structuring management assets such as security planning systems; human assets such as employee knowledge; technological assets such as software protection; intangible assets such as a safety culture and financial assets such as cost savings from security compliance. We administer the instrument to all firms operating in EU ports in 2011-2012. A list of firms is obtained from IHSfairplay Ports and Terminals Guide. The results of the survey shows that most managers do not perceive a competitive advantage was gained in the way security assets/resources/management systems were implemented. However, a strong minority 34.12% of managers did perceive competitive advantage was gained from port security compliance where systems/assets/resources were not easily imitated or the I. Furthermore, managers perceive where they were located within the port as an important advantage to security and competitiveness.

Stone, Jonathan Taylor

2013-05-01T23:59:59.000Z

5

Port Security: Improving Emergency Response Capabilities at the Ports of Los Angeles and Long Beach  

E-Print Network (OSTI)

PORT SECURITY: IMPROVING EMERGENCY RESPONSE CAPABILITIES ATMaritime Transportation Security Act of 2002, Pub. L. No.the Federal Maritime Security Coordinator for his respective

Zegart, Amy B; Hipp, Matthew C; Jacobson, Seth K

2005-01-01T23:59:59.000Z

6

Federal Energy Management Program: Energy Independence & Security Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence & Security Act to someone by E-mail Share Federal Energy Management Program: Energy Independence & Security Act on Facebook Tweet about Federal Energy Management Program: Energy Independence & Security Act on Twitter Bookmark Federal Energy Management Program: Energy Independence & Security Act on Google Bookmark Federal Energy Management Program: Energy Independence & Security Act on Delicious Rank Federal Energy Management Program: Energy Independence & Security Act on Digg Find More places to share Federal Energy Management Program: Energy Independence & Security Act on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act

7

Privacy Act Statement | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Statement | National Nuclear Security Administration Statement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Statement Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Statement Privacy Act Statement Agency forms used to collect personal information protected by the Act must

8

Energy Independence and Security Act of 2007 | Open Energy Information  

Open Energy Info (EERE)

Links Energy Independence and Security Act of 2007 Retrieved from "http:en.openei.orgwindex.php?titleEnergyIndependenceandSecurityActof2007&oldid255460" Category: Stubs...

9

Energy Independence and Security Act of 2007  

NLE Websites -- All DOE Office Websites (Extended Search)

Aug 31 2005 13:29 Jan 10, 2008 Aug 31 2005 13:29 Jan 10, 2008 Jkt 069139 PO 00140 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL140.110 APPS06 PsN: PUBL140 dkrause on GSDDPC29 with PUBLIC LAWS PUBLIC LAW 110-140-DEC. 19, 2007 ENERGY INDEPENDENCE AND SECURITY ACT OF 2007 VerDate Aug 31 2005 13:29 Jan 10, 2008 Jkt 069139 PO 00140 Frm 00002 Fmt 6580 Sfmt 6582 E:\PUBLAW\PUBL140.110 APPS06 PsN: PUBL140 dkrause on GSDDPC29 with PUBLIC LAWS 121 STAT. 1492 PUBLIC LAW 110-140-DEC. 19, 2007 Dec. 19, 2007 [H.R. 6] Energy Independence and Security Act of 2007. 42 USC 17001 note. Public Law 110-140 110th Congress An Act To move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and

10

Federal Energy Management Program: Energy Independence and Security Act,  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements to someone by E-mail Share Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Facebook Tweet about Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Twitter Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Google Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Delicious

11

Energy Independence and Security Act, Section 432: Federal Facility  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Independence and Security Act, Section 432: Federal Facility Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements October 8, 2013 - 2:02pm Addthis Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. The Federal Energy Management Program (FEMP) is responsible for tracking Federal agency progress toward meeting Section 432 of the Energy Independence and Security Act (EISA) of 2007 for Federal facility energy and water management and benchmarking. The EISA 432 Compliance Tracking System (EISA 432 CTS) tracks agency

12

Nuclear Waste Policy Act Signed | National Nuclear Security Administra...  

NLE Websites -- All DOE Office Websites (Extended Search)

Waste Policy Act Signed | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

13

Freedom of Information Act (FOIA) | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Freedom of Information Act (FOIA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

14

Energy Independence and Security Act, Section 432: Federal Facility  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facility Reporting » Energy Independence and Facility Reporting » Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements October 8, 2013 - 2:02pm Addthis Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. The Federal Energy Management Program (FEMP) is responsible for tracking Federal agency progress toward meeting Section 432 of the Energy Independence and Security Act (EISA) of 2007 for Federal facility energy and water management and benchmarking.

15

No Fear Act | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Working at NNSA Blog No Fear Act Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > No Fear Act No Fear Act The NNSA Office of Civil Rights is...

16

Privacy Act Requests | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

be your full name, any other names you might have used, your birth date, your social security number, and home address. Please provide a phone number where you can be reached...

17

No Fear Act | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

employees resulting from whistleblower complaints, and complaints before the Merit Systems Protection Board and the Equal Employment Opportunity Commission. The No Fear Act...

18

National Environmental Policy Act (NEPA) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Environmental Policy Act (NEPA) | National Nuclear Security Environmental Policy Act (NEPA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog National Environmental Policy Act (NEPA) Home > About Us > Our Operations > NNSA Office of General Counsel > National Environmental Policy Act (NEPA) National Environmental Policy Act (NEPA) Welcome to the U.S. Department of Energy National Nuclear Security

19

National Environmental Policy Act (NEPA) | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Policy Act (NEPA) | National Nuclear Security Environmental Policy Act (NEPA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog National Environmental Policy Act (NEPA) Home > About Us > Our Operations > NNSA Office of General Counsel > National Environmental Policy Act (NEPA) National Environmental Policy Act (NEPA) Welcome to the U.S. Department of Energy National Nuclear Security

20

Privacy Act Requests | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

to make a request Requests for records pursuant to the Act can be submitted to the NNSA Albuquerque Complex in writing at the following address: NNSA Albuquerque Complex Office...

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Truman Signs Atomic Energy Act | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Truman Signs Atomic Energy Act | National Nuclear Security Administration Truman Signs Atomic Energy Act | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > Truman Signs Atomic Energy Act Truman Signs Atomic Energy Act August 01, 1946 Washington, DC Truman Signs Atomic Energy Act President Truman signs the Atomic Energy Act of 1946, leading to the

22

Truman Signs Atomic Energy Act | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Truman Signs Atomic Energy Act | National Nuclear Security Administration Truman Signs Atomic Energy Act | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > Truman Signs Atomic Energy Act Truman Signs Atomic Energy Act August 01, 1946 Washington, DC Truman Signs Atomic Energy Act President Truman signs the Atomic Energy Act of 1946, leading to the

23

Energy Independence and Security Act | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requirements by Regulation » Energy Requirements by Regulation » Energy Independence and Security Act Energy Independence and Security Act October 8, 2013 - 1:43pm Addthis The Energy Independence and Security Act of 2007 (EISA 2007) established energy management goals and requirements while also amending portions of the National Energy Conservation Policy Act (NECPA). It was signed into law on December 19, 2007. This content is intended as a reference only. You should refer to the full text of EISA 2007 for more details or other sections relevant to your work. Energy Reduction Goals for Federal Buildings Section 431 amends Section 543(a)(1) of NECPA and adopts the energy intensity reduction goals of Executive Order (E.O.) 13423. The amended NECPA Section 543(a)(1) section now reads as follows:

24

Privacy Act Fees and Time Limits | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Fees and Time Limits | National Nuclear Security Administration Fees and Time Limits | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Fees and Time Limits Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Fees and Time Limits Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing

25

Privacy Act (PA) of 1974 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

(PA) of 1974 | National Nuclear Security Administration (PA) of 1974 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act (PA) of 1974 Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 Privacy Act (PA) of 1974 The purpose of the Privacy Act of 1974 (Act), Title 5, United States Code,

26

Statement of Neile L. Miller Acting Undersecretary for Nuclear Security and Acting Administrator  

National Nuclear Security Administration (NNSA)

Statement of Neile L. Miller Acting Undersecretary for Nuclear Security and Acting Administrator National Nuclear Security Administration U.S. Department of Energy on the Fiscal Year 2014 President's Budget Request Before the Subcommittee on Energy and Water Development Senate Committee on Appropriations April 24, 2013 INTRODUCTION Chairman Feinstein, Ranking Member Alexander, and distinguished members of the Subcommittee, thank you for having me here to discuss the President's Fiscal Year 2014 budget request for the Department of Energy's National Nuclear Security Administration (NNSA). Your ongoing support for

27

Freedom of Information Act (FOIA) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

(FOIA) | National Nuclear Security (FOIA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information Act (FOIA) Home > About Us > Our Operations > NNSA Office of General Counsel > Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) The FOIA establishes the premise that people should have access to

28

National Environmental Policy Act | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

National Environmental ... National Environmental ... National Environmental Policy Act The National Environmental Policy Act of 1969 requires all federal agencies to consider the environmental impacts of their proposed actions and the reasonable alternatives for implementing those actions during the decision making process. The Y-12 National Security Complex follows the Council on Environmental Quality regulations (40 CFR 1500-1508) and the Department of Energy's Implementing Procedures (10 CFR 1021). There are three types of NEPA documents, an Environmental Impact Statement, and Environmental Assessment, and a Categorical Exclusion Determination. Categorical exclusions are classes of DOE actions that DOE has, by regulation, determined do not individually or cumulatively have a

29

Energy Independence and Security Act Six-Year Review of Covered...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independence and Security Act Six-Year Review of Covered Products Energy Independence and Security Act Six-Year Review of Covered Products This memorandum explains that the Energy...

30

Alternative Fuels Data Center: Energy Independence and Security Act of 2007  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Independence Independence and Security Act of 2007 (P.L. 110-140) to someone by E-mail Share Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Facebook Tweet about Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Twitter Bookmark Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Google Bookmark Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Delicious Rank Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Digg Find More places to share Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on AddThis.com... More in this section...

31

Petroleum Gasoline & Distillate Needs Including the Energy Independence and Security Act (EISA) Impacts  

Reports and Publications (EIA)

This presentation describes the projections for petroleum-based gasoline and distillate in the Update AEO 2008, which includes the impacts of the Energy Independence and Security Act.

Information Center

2008-03-11T23:59:59.000Z

32

Nuclear Waste Policy Act Signed | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

> Nuclear Waste Policy Act Signed Nuclear Waste Policy Act Signed January 07, 1983 Washington, DC Nuclear Waste Policy Act Signed President Reagan signs the Nuclear Waste...

33

Energy Independence and Security Act of 2007 Select News and Analysis  

E-Print Network (OSTI)

Energy Independence and Security Act of 2007 Select News and Analysis WSU Extension Energy Library http://www.energy.wsu.edu/library/ ©Washington State University Extension Energy Program Energy Energy Library Last updated: 4/12/2012 Text of the Energy Independence and Security Act of 2007 (EISA

Collins, Gary S.

34

Privacy Act Fees and Time Limits | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing records. However, it is the policy of the DOE to provide an individual...

35

Public Comment re Section 934 of the Energy Independence and Security Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Section 934 of the Energy Independence and Section 934 of the Energy Independence and Security Act of 2007 Public Comment re Section 934 of the Energy Independence and Security Act of 2007 Public Comment by the Uranium Producers of America (UPA) re Section 934 of the Energy Independence and Security Act of 2007 (EISA). The UPA urges DOE to clarify the definition of nuclear supplier to not include uranium production or conversion services as a covered person under EISA. In the alternative, uranium producers and converters should be excluded under the regulations from any cost allocation formula because neither of these entities would contribute to the proximate causation of a covered nuclear incident. Public Comment re Section 934 of the Energy Independence and Security Act of 2007 More Documents & Publications

36

Privacy Act Links to Relates Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Proposed Rules, and Notices of Federal agencies and organizations, as well as Executive Orders and other Presidential Documents. The Privacy Act Issuances Compilation contains...

37

Privacy Act System Notices | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

on himher; how an individual can access or amend the record; and the categories of sources of records in the system. The Act requires an agency to publish notice of a proposed...

38

NIST Activities in Support of the Energy Independence and Security Act  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NIST Activities in Support of the Energy Independence and Security NIST Activities in Support of the Energy Independence and Security Act (EISA) of 2007 NIST Activities in Support of the Energy Independence and Security Act (EISA) of 2007 Revitalizing the electric power grid has become one of our Nation's top priorities, promising to reduce our dependence on oil and to meet the anticipated 1.1% annual increase in demand for electricity1. In his New Energy for America plan, President-elect Obama calls for increased investment in the next generation power grid, referred to as the Smart Grid, to help reach the ambitious goals of ensuring that renewable sources provide 10% of our electricity by 2012 and 25% by 2025; and that 1 million Plug-In Hybrid cars are on the roads by 2015. NIST Activities in Support of the Energy Independence and Security Act

39

Numerical Simulations of Maritime Frontogenesis  

Science Conference Proceedings (OSTI)

A hydrostatic primitive equation model initialized in a highly baroclinically unstable state was used to simulate maritime cyclogenesis and frontogenesis. In order to identify boundary layer physical processes important in maritime frontogenesis, ...

William T. Thompson; R. T. Williams

1997-01-01T23:59:59.000Z

40

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Energy Independence and Security Act of 2007: Summary of Provisions (released in AEO2008)  

Reports and Publications (EIA)

The Energy Independence and Security Act of 2007 was signed into law on December 19, 2007, and became Public Law 110-140 [8]. Provisions in EISA2007 that require funding appropriations to be implemented, whose impact is highly uncertain, or that require further specification by Federal agencies or Congress are not included in AEO2008. For example, EIA does not try to anticipate policy responses to the many studies required by EISA2007, nor to predict the impact of research and development (R&D) funding authorizations included in the bill. Moreover, AEO2008 does not include any provision that addresses a level of detail beyond that modeled in NEMS, which was used to develop the AEO2008 projections. AEO2008 addresses only those provisions in EISA2007 that establish specific tax credits, incentives, or standards, including the following:

Information Center

2008-06-26T23:59:59.000Z

42

Evolution of interagency cooperation in the United States Government : the Maritime Operational Threat Response Plan  

E-Print Network (OSTI)

Following the September 11, 2001 terrorist attacks, there was concern among maritime security experts that terrorist or criminal organizations that wanted to do harm to the United States could exploit gaps that existed ...

Tomasulo, Gary L., Jr

2010-01-01T23:59:59.000Z

43

Cooperative measures to mitigate Asia-Pacific maritime conflicts.  

Science Conference Proceedings (OSTI)

The economies of East Asia are predominantly export based and, therefore, place special emphasis on the security of the sea lines of communication (SLOCs). Due to economic globalization, the United States shares these concerns. Cooperative measures by the concerned parties could reduce the potential for disruption by maritime conflicts. Primary threats against the SLOCs are disputes over the resources under the seas, disputes over some small island groups, disputes between particular parties (China-Taiwan and North-South Korea), or illegal activities like smuggling, piracy, or terrorism. This paper provides an overview on these threats, issue by issue, to identify common elements and needed cooperation. Cooperation on other topics such as search and rescue, fisheries protection, and oil spill response may help support improved relations to prevent maritime conflicts. Many technologies can help support maritime cooperation, including improved communications links, tracking and emergency beacon devices, and satellite imaging. Appropriate technical and political means are suggested for each threat to the SLOCs.

Chai, Wen-Chung (Taiwan Navy)

2003-05-01T23:59:59.000Z

44

Energy Market and Economic Impacts of S.2191, the Lieberman-Warner climate Security Act of 2007  

Gasoline and Diesel Fuel Update (EIA)

1 1 Energy Market and Economic Impacts of S. 2191, the Lieberman-Warner Climate Security Act of 2007 April 2008 Energy Information Administration Office of Integrated Analysis and Forecasting U.S. Department of Energy Washington, DC 20585 This report was prepared by the Energy Information Administration, the independent statistical and analytical agency within the Department of Energy. The information contained herein should be attributed to the Energy Information Administration and should not be construed as advocating or reflecting any policy position of the Department of Energy or any other organization. Service Reports are prepared by the Energy Information Administration upon special request and are based on assumptions specified by

45

The Maritime Culture of Madura, Indonesia  

E-Print Network (OSTI)

The Maritime Culture of Madura, Indonesia A Public Lecture presented by Dr Kurt Stenross, Asia Research Centre Among the maritime peoples of Indonesia, the Madurese, from the island of Madura off Indonesia, the Madurese stand in counterpoint to the other main maritime groups which are all from Sulawesi

46

Presented by National Security College  

E-Print Network (OSTI)

of maritime security, the Taiwan question, and the US-China nuclear balance and extended deterrence. HePresented by National Security College Japan Institute Strategic and Defence Studies Centre Department of Political and Social Change ARC Centre of Excellence in Policing and Security Pivotal Alliance

47

The Purpose and Value of Successful Technology Demonstrations … The Energy Independence and Security Act of 2007 Demonstrations  

NLE Websites -- All DOE Office Websites (Extended Search)

Purpose and Value of Successful Technology Demonstrations - The Energy Purpose and Value of Successful Technology Demonstrations - The Energy Independence and Security Act of 2007 Demonstrations by Steve Bossart, NETL Senior Management and Technical Advisor, and Steve Pullins, Team Leader, DOE/NETL Modern Grid Strategy Our industry has piloted many, many technologies, but truly deployed few. Can we say that we completely understand the value of a single technology piloted in a couple different utilities? Or, must we integrate this technology with other technologies in a real-world environment to discover those additional values and benefits that go beyond its solo application? When we survey the industry for technology penetration, we find a sad picture....many solo pilots, but little evidence of integrated advanced technologies. The reasons are simple and clear.

48

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

49

Optimization Online - Flexible Solutions to Maritime Inventory ...  

E-Print Network (OSTI)

Aug 12, 2013 ... Flexible Solutions to Maritime Inventory Routing Problems with Delivery Time Windows. Chengliang Zhang(czhang85 ***at*** gatech.edu)

50

MIRPLib: A Maritime Inventory Routing Problem Library  

E-Print Network (OSTI)

Aug 28, 2013 ... Abstract: This paper presents a detailed description of a particular class of deterministic single product maritime inventory routing problems...

51

Cognitive maritime wireless mesh/ad hoc networks  

Science Conference Proceedings (OSTI)

Cognitive maritime wireless mesh/ad hoc networks are proposed in this paper, for the purpose to provide high-speed and low-cost communications for the current maritime users by incorporating the licensed but unused frequency bands opportunistically. ... Keywords: Cognitive radio networks, IEEE 802.16, Maritime communications, Maritime mesh networks, Mesh/ad hc networks, White Space

Ming-Tuo Zhou; Hiroshi Harada

2012-03-01T23:59:59.000Z

52

Feasibility analysis of scanning 100% of maritime cargo containers for fissile material  

E-Print Network (OSTI)

On August 3, 2007, President George W. Bush signed into law H.R. 1: Implementing Recommendations of the 9/11 Commission Act of 2007. The law mandates that 100% of air and maritime cargo must be scanned prior to entering ...

Foley, William E., III

2008-01-01T23:59:59.000Z

53

Lake Ontario Maritime Cultural Landscape  

E-Print Network (OSTI)

The goal of the Lake Ontario Maritime Cultural Landscape project was to investigate the nature and distribution of archaeological sites along the northeast shoreline of Lake Ontario while examining the environmental, political, and cultural factors that influenced the position of these sites. The primary method of investigation was a combined archaeological and historical survey of the shoreline within seven 1-km square areas. The archaeological component of the survey covered both the terrestrial and submerged portions of the shore through marine remote sensing (side-scan sonar and magnetometer), diving surveys, pedestrian surveys, and informant interviews. A total of 39 sites and 51 isolated finds were identified or further analyzed as a result of this project. These sites ranged from the Middle Archaic period (ca. 5500-2500 B.C.) through the 19th century and included habitation, military, transportation, and recreational sites. Analysis of these findings was conducted at two scales: the individual survey area and Lake Ontario as a whole. By treating each survey area as a distinct landscape, it was possible to discuss how various cultures and groups used each space and to identify instances of both dynamism and continuity in the landscapes. Results of these analyses included the continuous occupation of several locations from pre-Contact times to the present, varying uses of the same environment in response to political and economic shifts, the formation of communities around transportation nodes, and recurring settlement patterns. The survey data was also combined to explore regional-scale trends that manifest themselves in the historical Lake Ontario littoral landscape including ephemeral landscapes, permeable boundaries, danger in the lake, and factors of change.

Ford, Benjamin L.

2009-08-01T23:59:59.000Z

54

2012 SG Peer Review - Recovery Act: Secure Interoperable Open Smart Grid Demonstration Project - Tom Magee, ConEd NY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Demonstration Project Demonstration Project Patricia Robison Con Edison June 8, 2012 December 2008 Smart Grid Demonstration Project Objective Life-cycle Funding FY10 - FY13 $45.4 m Technical Scope (Insert graphic here) 2 *Integrate Legacy and Smart Grid information systems *Integrate external DR into distribution grid systems: - EV/Battery storage - Building Management Systems (BMS) - Standby generation - Photovoltaic Demonstrate secure interoperable services between utility distribution systems and customer owned distributed resources (DR) December 2008 Needs and Project Targets Integrate customer owned resources into distribution operations to enable customer participation and defer capital investment *Integrate DR resources into operator platform *Implement secure communications to DR resources

55

Harbour Island: The Comparative Archaeology of a Maritime Community  

E-Print Network (OSTI)

Archaeological research at Harbour Island, Bahamas, was designed to help explore and develop the concept of maritimity, or identity grounded in perceived (or imagined) shared traits deriving from a communitys relationship with the maritime environment. Maritimity can best be identified by using three broad and overlapping categories of Landscape, Maritime Resources and Maritime Material Culture. Historical documents and maritime cultural landscape elements establish the maritimity of Harbour Island in the context of these categories. Artifacts, procured through archaeological survey of nine properties inhabited since at least the eighteenth century, are analyzed to investigate whether there any notable differences in the archaeological assemblages of maritime communities that indicate maritimity. Analysis relies on Stanley South's artifact classification system and his Carolina Artifact pattern. The nine properties are compared among themselves as well as with four other sites from the western British Atlantic region. Comparisons between the Harbour Island sites reveal a strong homogeneity of ceramic types at all households and a low representation of personal and clothing artifacts that indicate the relative poverty of the community. Maritime activities are not strongly represented in the archaeological record. When compared to four other sites from Jamaica, South Carolina, North Carolina, and Delaware, the assemblage from the Harbour Island community is relatively comparable to other sites influenced by British colonial culture. Although the domestic artifacts contain little maritime material culture, the development of the island's built environment demonstrates maritimity in both the categories of Landscape and Maritime Material Culture. Faunal remains from Harbour Island, consisting primarily of fish and shellfish, provide archaeological evidence of the importance of the Maritime Resources category. Only when the evidence from all three categories of maritimity is considered together can Harbour Island be identified archaeologically as a community that strongly identified with both the maritime environment and the dominant British Colonial Atlantic culture.

Hatch, Heather E

2013-08-01T23:59:59.000Z

56

Maine Maritime Academy | Open Energy Information  

Open Energy Info (EERE)

Academy Academy Jump to: navigation, search Name Maine Maritime Academy Address Engineering Department Pleasant Street Place Castine Zip 4420 Sector Marine and Hydrokinetic Phone number 207-326-2365 Website http://http://www.mainemaritim Region United States LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This company is listed in the Marine and Hydrokinetic Technology Database. This company is involved in the following MHK Projects: Castine Harbor Badaduce Narrows Tidal Energy Device Evaluation Center TIDEC This article is a stub. You can help OpenEI by expanding it. Retrieved from "http://en.openei.org/w/index.php?title=Maine_Maritime_Academy&oldid=678366" Categories: Clean Energy Organizations Companies Organizations Stubs

57

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... The PRISMA is based upon existing federal directives including Federal Information Security Management Act (FISMA), NIST guidelines and other ...

58

Security Aspects of Electronic Voting  

Science Conference Proceedings (OSTI)

Security Aspects of Electronic Voting. Summary: The Help America Vote Act (HAVA) of 2002 was passed by Congress to ...

2013-08-01T23:59:59.000Z

59

Maritime Transportation System: Trends and Outlook  

E-Print Network (OSTI)

2007-R-5 Water is an essential resource in the U.S. economy. It plays a crucial role in supporting many economic activities and ensuring the quality of human life and the health of ecological systems. Despite this, the value of water may not be widely appreciated because only some water resources and water uses are easily visible or noticed while others are not. Among the Institute for Water Resources (IWR) Future Directions program activities are the identification of emerging water challenges and opportunities and the tactical engagement of U.S. Army Corps of Engineers (USACE) senior leaders on these issues. Such critical thinking is an essential prerequisite to strategy development and planning. IWR has developed this series of Water Resources Outlook papers, commissioned utilizing outside experts, to identify emerging issues and implications for the Nation. These issues and implications will be presented in the form of provocation sessions with external and internal subject matter experts and stakeholders and will inform the USACE strategic planning process. Maritime Transportation System: Trends and Outlook USACE major responsibilities for waterborne commerce include dredging, development and maintenance of the inland and coastal waterways and related maritime infrastructure, and

unknown authors

2007-01-01T23:59:59.000Z

60

The Geography of Transport Systems-Maritime Transportation | Open Energy  

Open Energy Info (EERE)

The Geography of Transport Systems-Maritime Transportation The Geography of Transport Systems-Maritime Transportation Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Geography of Transport Systems-Maritime Transportation Agency/Company /Organization: Hofstra University Sector: Energy Focus Area: Transportation Topics: Technology characterizations Resource Type: Publications, Technical report Website: people.hofstra.edu/geotrans/eng/ch3en/conc3en/ch3c4en.html Cost: Free Language: English References: Maritime Transportation[1] "Maritime transportation, similar to land and air modes, operates on its own space, which is at the same time geographical by its physical attributes, strategic by its control and commercial by its usage. While geographical considerations tend to be constant in time, strategic and

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Massachusetts Maritime Academy Wind Farm | Open Energy Information  

Open Energy Info (EERE)

Maritime Academy Wind Farm Maritime Academy Wind Farm Jump to: navigation, search Name Massachusetts Maritime Academy Wind Farm Facility Massachusetts Maritime Academy Sector Wind energy Facility Type Community Wind Facility Status In Service Owner Massachusetts Maritime Academy Developer Massachusetts Maritime Academy Energy Purchaser Massachusetts Maritime Academy Location Buzzards Bay - Cape Cod MA Coordinates 41.741349°, -70.62382° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.741349,"lon":-70.62382,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

62

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

63

A comparative study of maritime operations in India  

E-Print Network (OSTI)

This thesis studies the maritime sector of India, specifically using China as a basis for comparison. Chinese economic impact is studied under the two major headings: the effective use of non-living and living resources. ...

Mukundan, Harish

2007-01-01T23:59:59.000Z

64

An Expert System Approach for Prediction of Maritime Visibility Obscuration  

Science Conference Proceedings (OSTI)

An Expert system for Shipboard Obscuration Prediction (AESOP), an artificial intelligence approach to forecasting maritime visibility obscurations, has been designed, developed, and tested. The problem-solving model for AESOP, running within an ...

James E. Peak; Paul M. Tag

1989-12-01T23:59:59.000Z

65

Physical Processes Governing the Rapid Deepening Tail of Maritime Cyclogenesis  

Science Conference Proceedings (OSTI)

The positively skewed distribution of maritime cyclone maximum deepening rates is investigated for cyclones as a class rather than through individual case study, using a series of experiments employing perpetual January simulations from the global ...

Paul J. Roebber; Melissa R. Schumann

2011-09-01T23:59:59.000Z

66

Program Review for Information Security Management ...  

Science Conference Proceedings (OSTI)

... The PRISMA is based upon existing federal directives including Federal Information Security Management Act (FISMA), NIST guidelines and other ...

2013-01-15T23:59:59.000Z

67

International Maritime Law Institute (IMLI) | Open Energy Information  

Open Energy Info (EERE)

Maritime Law Institute (IMLI) Maritime Law Institute (IMLI) Jump to: navigation, search Name International Maritime Law Institute (IMLI) Address University of Malta Campus,University Heights,Tal-Qroqq,Msida, MALTA MSD2080 Place Msida, Malta Phone number +356 21319343 Website http://www.imli.org/ Coordinates 35.8977778°, 14.4894444° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":35.8977778,"lon":14.4894444,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

68

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

69

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

70

An Analysis of Low-Frequency Maritime Atmospheric Turbulence  

Science Conference Proceedings (OSTI)

New data are presented for the spectrum of turbulent wind energy under maritime conditions in the frequency region 1.00.03 mHz. The corresponding measurements were made at five levels on a mast 46 m high on a small islet off the coast of central ...

Johannes Gjerstad; Svein Erik Aasen; Helge I. Andersson; Iver Brevik; Jrgen Lvseth

1995-08-01T23:59:59.000Z

71

Guidance_Application_Federal_Vacancies_Reform_Act_1998.pdf |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

nceApplicationFederalVacanciesReformAct1998.pdf More Documents & Publications Intelligence Reform and Terroroism Prevention Act - December 17, 2004 Bond Amendment, Security...

72

SUBJECT: National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Sandia Site Ofce P. 0. Box 5400 Albuquerque, NM 87185 JAN O=P= ONP= Annual National Environmental Policy Act Planning Sumary 2013 Attached is: the Annual National Environmental Policy Act (NEPA) Planning Summary for the National Nuclear Security Administation, Sandia Site Ofce (SSO). Currently, there are two environmental assessments planned and one environmental impact statement in progess for the

73

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

74

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

75

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

76

Energy Efficiency and Renewable Energy Research, Development, and Deployment in Meeting Greenhouse Gas Mitigation Goals: The Case of the Lieberman-Warner Climate Security Act of 2007 (S.2191)  

SciTech Connect

The U.S. federal government is considering actions to reduce greenhouse gas emissions. Renewable energy and energy efficiency technologies could help reduce greenhouse gas emissions, so the cost of these technologies could significantly influence the overall cost of meeting greenhouse gas limits. This paper examines the potential benefit of reduced technology cost by analyzing the case of the Lieberman-Warner Climate Security Act of 2007 (S.2191). This act had a goal of reducing national carbon emissions in 2050 to levels 72 percent below 2006 emission levels. In April 2008, the U.S. Department of Energy, Energy Information Administration (EIA) published an analysis of the effects of S.2191 on the U.S. energy sector. This report presents a similar analysis: both analyses examined the impacts of S.2191, and both used versions of the National Energy Modeling System. The analysis reported here used modified technology assumptions to reflect U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy (EERE) program goals. The results show that achieving EERE program goals could reduce the cost of meeting greenhouse gas limits, reduce the cost of renewable electricity generation and biofuels, and reduce energy intensity.

Showalter, S.; Wood, F.; Vimmerstedt, L.

2010-06-01T23:59:59.000Z

77

Paul Cunningham-Acting Associate CIO for Cybersecurity & Acting Chief  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Paul Cunningham-Acting Associate CIO for Cybersecurity & Acting Paul Cunningham-Acting Associate CIO for Cybersecurity & Acting Chief Information Security Officer Paul Cunningham-Acting Associate CIO for Cybersecurity & Acting Chief Information Security Officer Paul Cunningham-Acting Associate CIO for Cybersecurity & Acting Chief Information Security Officer As the acting Associate Chief Information Officer for Cybersecurity, Mr. Cunningham serves as the Department's Chief Information Security Officer charged with managing the agency's enterprise cybersecurity program. Mr. Cunningham advises the Department's CIO and senior agency officials in the implementation of cybersecurity and the Department's Risk Management Approach. Mr. Cunningham provides executive leadership and guidance for joint agency and Administration cybersecurity initiatives including for the

78

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

79

Post-Closure Report for Closed Resource Conservation and Recovery Act Corrective Action Units, Nevada National Security Site, Nevada, For Fiscal Year 2010  

Science Conference Proceedings (OSTI)

This report serves as the combined annual report for post-closure activities for the following closed Corrective Action Units (CAUs): (1) CAU 90, Area 2 Bitcutter Containment; (2) CAU 91, Area 3 U-3fi Injection Well; (3) CAU 92, Area 6 Decon Pond Facility; (4) CAU 110, Area 3 WMD U-3ax/bl Crater; and (5) CAU 112, Area 23 Hazardous Waste Trenches. The locations of the sites are shown in Figure 1. This report covers fiscal year 2010 (October 2009-September 2010). The post-closure requirements for these sites are described in Resource Conservation and Recovery Act Permit Number NEV HW0021 and summarized in each CAU-specific section in Section 1.0 of this report. Site inspections are conducted semiannually at CAUs 90 and 91 and quarterly at CAUs 92, 110, and 112. Additional inspections are conducted at CAU 92 if precipitation occurs in excess of 0.50 inches in a 24-hour period. Inspections include an evaluation of the condition of the units and identification of any deficiencies that may compromise the integrity of the units. The condition of covers, fencing, signs, gates, and locks is documented. In addition, soil moisture monitoring and subsidence surveys are conducted at CAU 110. The results of the inspections, summary of maintenance activities, results of vegetations surveys, and analysis of monitoring data are presented in this report. Copies of the inspection checklists are included as Appendix A. Field notes completed during each inspection are included in Appendix B. Photographs taken during the site inspections are included in Appendix C.

NSTec Environmental Management

2011-01-26T23:59:59.000Z

80

Post-Closure Report for Closed Resource Conservation and Recovery Act Corrective Action Units, Nevada National Security Site, Nevada for Fiscal Year 2011 (October 2010-September 2011)  

SciTech Connect

This report serves as the combined annual report for post-closure activities for the following closed Corrective Action Units (CAUs): (1) CAU 90, Area 2 Bitcutter Containment; (2) CAU 91, Area 3 U-3fi Injection Well; (3) CAU 92, Area 6 Decon Pond Facility; (4) CAU 110, Area 3 WMD U-3ax/bl Crater; and (5) CAU 112, Area 23 Hazardous Waste Trenches. This report covers fiscal year 2011 (October 2010-September 2011). The post-closure requirements for these sites are described in Resource Conservation and Recovery Act Permit Number NEV HW0101 and summarized in each CAU-specific section in Section 1.0 of this report. Site inspections are conducted semiannually at CAUs 90 and 91 and quarterly at CAUs 92, 110, and 112. Additional inspections are conducted at CAU 92 if precipitation occurs in excess of 0.50 inches in a 24-hour period. Inspections include an evaluation of the condition of the units and identification of any deficiencies that may compromise the integrity of the units. The condition of covers, fencing, signs, gates, and locks is documented. In addition, soil moisture monitoring and subsidence surveys are conducted at CAU 110. The results of the inspections, summary of maintenance activities, results of vegetations surveys, and analysis of monitoring data are presented in this report. Copies of the inspection checklists are included as Appendix A. Field notes completed during each inspection are included in Appendix B. Photographs taken during the inspections are included in Appendix C. It is recommended to continue semiannual inspections at CAUs 90 and 91; quarterly inspections at CAUs 92, 110, and 112; and additional inspections at CAU 92 if precipitation occurs in excess of 0.50 inches in a 24-hour period. At CAU 92, it is recommended to remove the wave barriers, as they have not proven to be necessary to protect the cover. At CAU 110, it is recommended to continue annual vegetation monitoring and soil moisture monitoring, and to reduce the frequency of subsidence surveys from twice per year to once every other year (biennially).

NSTec Environmental Restoration

2012-01-18T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Edward Bruce Held | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

to the national security of the United States." In June 2013, Energy Secretary Ernest Moniz asked Mr. Held to assume the responsibilities of Associate Deputy Secretary and Acting...

82

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

83

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

84

The Influence of Time-Dependent Melting on the Dynamics and Precipitation Production in Maritime and Continental Storm Clouds  

Science Conference Proceedings (OSTI)

Simulations of one maritime and four continental observed cases of deep convection are performed with the Hebrew University Cloud Model that has spectral bin microphysics. The maritime case is from observations made on 18 September 1974 during ...

Vaughan T. J. Phillips; Andrei Pokrovsky; Alexander Khain

2007-02-01T23:59:59.000Z

85

Toward establishing a maritime proxy record of the East Asian summer monsoons for the late Quaternary  

E-Print Network (OSTI)

Toward establishing a maritime proxy record of the East Asian summer monsoons for the late proxy of the summer monsoon intensity over the South China Sea and Southeast Asia. The profile of this maritime proxy matches well with the summer monsoon index obtained from the terrestrial record of Louchuan

Wei, Kuo-Yen

86

Annual Cycle of Southeast Asia -Maritime Continent Rainfall and the Asymmetric Monsoon Transition  

E-Print Network (OSTI)

Annual Cycle of Southeast Asia - Maritime Continent Rainfall and the Asymmetric Monsoon Transition Peninsula and Philippines are in the Asian summer monsoon regime while the Maritime Continent experiences a wet monsoon during boreal winter and a dry season during boreal summer. However, the complex

Chang, Chih-Pei

87

A Branch-Price-and-Cut Algorithm for Single-Product Maritime Inventory Routing  

Science Conference Proceedings (OSTI)

A branch-price-and-cut algorithm is developed for a complex maritime inventory-routing problem with varying storage capacities and production/consumption rates at facilities. The resulting mixed-integer pricing problem is solved exactly and efficiently ... Keywords: column generation, dynamic programming, integer programming, maritime inventory routing

Faramroze G. Engineer; Kevin C. Furman; George L. Nemhauser; Martin W. P. Savelsbergh; Jin-Hwa Song

2012-01-01T23:59:59.000Z

88

Triple acting radial seal  

SciTech Connect

A triple acting radial seal used as an interstage seal assembly in a gas turbine engine, where the seal assembly includes an interstage seal support extending from a stationary inner shroud of a vane ring, the interstage seal support includes a larger annular radial inward facing groove in which an outer annular floating seal assembly is secured for radial displacement, and the outer annular floating seal assembly includes a smaller annular radial inward facing groove in which an inner annular floating seal assembly is secured also for radial displacement. A compliant seal is secured to the inner annular floating seal assembly. The outer annular floating seal assembly encapsulates the inner annular floating seal assembly which is made from a very low alpha material in order to reduce thermal stress.

Ebert, Todd A (West Palm Beach, FL); Carella, John A (Jupiter, FL)

2012-03-13T23:59:59.000Z

89

Maritime Electric- Net Metering (Prince Edward Island, Canada)  

Energy.gov (U.S. Department of Energy (DOE))

In December 2005 The Renewable Energy Act and associated Regulations came into effect. A Government policy objective incorporated in the Act was the introduction of net metering for...

90

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

91

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

92

Calendar Year 2007 Resource Conservation and Recovery Act Annual Monitoring Report for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee - RCRA Post-Closure Permit Nos. TNHW-113, TNHW-116, and TNHW-128  

SciTech Connect

This report contains groundwater quality monitoring data obtained during calendar year (CY) 2007 at the following hazardous waste treatment, storage, and disposal (TSD) units located at the US Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee; this S-3 Site, Oil Landfarm, Bear Creek Burial Grounds/Walk-In Pits (BCBG/WIP), Eastern S-3 Site Plume, Chestnut Ridge Security Pits (CRSP), Chestnut Ridge Sediment Disposal Baste (CRSDB), few Hollow Quarry (KHQ), and East Chestnut Ridge Waste Pile (ECRWP). Hit monitoring data were obtained in accordance with the applicable Resource Conservation and Recovery Act of 1976 (RCRA) hazardous waste post-closure permit (PCP). The Tennessee Department of Environment and Conservation (TDEC) - Division of Solid Waste Management issued the PCPs to define the requirements for RCRA post-closure inspection, maintenance, and groundwater monitoring at the specified TSD units located within the Bear Creek Hydrogeologic Regime (PCP no. TNHW-116), Upper East Fork Poplar Creek Hydrogeologic Regime (PCP no. TNHW-113), and Chestnut Ridge Hydrogeologic Regime (PCP no. TNHW-128). Each PCP requires the Submittal of an annual RCRA groundwater monitoring report containing the groundwater sampling information and analytical results obtained at each applicable TSD unit during the preceding CY, along with an evaluation of groundwater low rates and directions and the analytical results for specified RCRA groundwater target compounds; this report is the RCRA annual groundwater monitoring report for CY 2007. The RCRA post-closure groundwater monitoring requirements specified in the above-referenced PCP for the Chestnut Ridge Regime replace those defined in the previous PCP (permit no. TNHW-088), which expired on September 18, 2005, but remained effective until the TDEC issued the new PCP in September 2006. The new PCP defines site-specific groundwater sampling and analysis requirements for the CRSDB, CRSP, and KHQ that differ from those established under the expired PCP, including modified suites of laboratory analytes (RCRA groundwater target compounds) for each site and annual rather than semiannual sampling frequencies for the CRSDB and KHQ. The new PCP also specifies the RCRA post-closure groundwater monitoring requirements for the ECRWP, a closed TSD unit that was not addressed in the expired PCP.

Elvado Environmental

2008-02-01T23:59:59.000Z

93

Privacy Act Disclosures | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

of compelling circumstances affecting the health or safety of an individual; to either House of Congress, or any committee or subcommittee thereof; to the Comptroller General in...

94

Privacy Act Violations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

are enforceable through legal action. Criminal and civil penalties may apply. It is a crime if any officer or employee of an agency knowingly and willfully discloses individually...

95

Privacy Act Exemptions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

exemptions: Section 552a(j)(1) which covers records maintained by the Central Intelligence Agency, Section 552a(j)(2) which covers records relating to law enforcement...

96

Privacy Act Exemptions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Special exemption, Section 552a(d)(5), which prohibits an individual access to any information compiled in reasonable anticipation of a civil action or proceeding. General...

97

Privacy Act Violations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

or employee of an agency knowingly and willfully discloses individually identifiable information to any person or agency without written consent of the individual to whom the...

98

Chapter_3_Personnel_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

99

Maritime chokepoints critical to petroleum markets - Today in ...  

U.S. Energy Information Administration (EIA)

Home; Browse by Tag; Most Popular Tags. electricity; oil/petroleum; liquid fuels; ... world oil transit chokepoints are a critical part of global energy security. ...

100

MARITIME SHIPPING IN NORTHEAST ASIA: LAW OF THE SEAS, SEA LANES, AND SECURITY  

E-Print Network (OSTI)

of issues (e.g. , land-source pollution) that are sometimesboth ship and land-based sources of pollution, minimizationland-based activities form the main source of marine pollution.

Calder, Kent; Fesharaki, Fereidun

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

MARITIME SHIPPING IN NORTHEAST ASIA: LAW OF THE SEAS, SEA LANES, AND SECURITY  

E-Print Network (OSTI)

Per- sian Gulf and the quantity of oil shipments in- volvedthe quantity of the products imported to the country. Oilquantities (8,000 b/d) to North Korea. 2 Russia regards oil

Calder, Kent; Fesharaki, Fereidun

1998-01-01T23:59:59.000Z

102

MARITIME SHIPPING IN NORTHEAST ASIA: LAW OF THE SEAS, SEA LANES, AND SECURITY  

E-Print Network (OSTI)

quantity of oil shipments in- volved is expected to increase. The Northeast Asian region also imports

Calder, Kent; Fesharaki, Fereidun

1998-01-01T23:59:59.000Z

103

MARITIME SHIPPING IN NORTHEAST ASIA: LAW OF THE SEAS, SEA LANES, AND SECURITY  

E-Print Network (OSTI)

P ETROLEUM 47 ship-source oil pollution, paper presentedin Control of Ship-Source Oil Pollution in Southeast Asiasafety and ship-source oil pol- lution in Northeast Asia

Calder, Kent; Fesharaki, Fereidun

1998-01-01T23:59:59.000Z

104

MARITIME SHIPPING IN NORTHEAST ASIA: LAW OF THE SEAS, SEA LANES, AND SECURITY  

E-Print Network (OSTI)

invest- ment in new refinery capacity, particularly inproduct by the imports of refinery feed- stock. A partialsourced from the new refineries within Asia. Drewry Shipping

Calder, Kent; Fesharaki, Fereidun

1998-01-01T23:59:59.000Z

105

MARITIME SHIPPING IN NORTHEAST ASIA: LAW OF THE SEAS, SEA LANES, AND SECURITY  

E-Print Network (OSTI)

London. Table 2: Oil Reserves, Production, Refining Capacity1996, pp. 251, 174, 280. Oil Reserves, Production, RefiningKoreas have no known oil reserves. The pattern seemed almost

Calder, Kent; Fesharaki, Fereidun

1998-01-01T23:59:59.000Z

106

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

107

Chapter_11_Incidents_of_Security_Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. HS-91 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect the safeguards and security program's capability to protect DOE safeguards and security interests * Indicate failure to adhere to security procedures * Reveal that the system is not functioning properly, by identifying and/or mitigating potential threats (e.g., detecting suspicious activity, hostile acts, etc.).

108

NNSA Acting Administrator Bruce Held holds all hands meeting...  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA Acting Administrator Bruce Held holds all hands meeting | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the...

109

President Ford Signs the Energy Reorganization Act of 1974 |...  

National Nuclear Security Administration (NNSA)

Ford Signs the Energy Reorganization Act of 1974 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

110

ANNUAL NATIONAL ENVIRONMENTAL POLICY ACT PLANNING SUMMARY FOR  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ENVIRONMENTAL POLICY ACT PLANNING SUMMARY FOR FISCAL YEAR 2012 FOR THE Y-12 NATIONAL SECURITY COMPLEX I. Environmental Impact Statements (EIS) on-going activity. Site-Wide...

111

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

112

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

113

Privacy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Privacy Act Privacy Act Code of Federal Regulations (CFR) for the Privacy Act is 10CFR 1008 Privacy Act of 1974 and Amendments (as of Jan 2, 1991) From GPO US Code on CD-ROM (GPO S/N 052-001-004-00439-6) $30.00 -CITE- 5 USC Sec. 552a -EXPCITE- TITLE 5 PART I CHAPTER 5 SUBCHAPTER II -HEAD- Sec. 552a. Records maintained on individuals -EXPCITE- TITLE 5 PART I CHAPTER 5 SUBCHAPTER II -HEAD- Sec. 552a. Records maintained on individuals -STATUTE- (a) Definitions. - For purposes of this section - (1) the term 'agency' means agency as defined in section 552(e) (FOOTNOTE 1) of this title; (FOOTNOTE 1) See References in Text note below. (2) the term 'individual' means a citizen of the United States or an alien lawfully admitted for permanent residence (3) the term 'maintain' includes maintain, collect, use, or disseminate;

114

Manufacturing supply chain applications: ai-based optimization for fleet management in maritime logistics  

Science Conference Proceedings (OSTI)

This paper outlines the features of an automated Decision Support System (DSS) developed to optimize the logistics of maritime transportation for a large chemical company. The paper focuses on the design and implementation of an optimization module to ...

Agostino Bruzzone; Alessandra Orsoni; Roberto Mosca; Roberto Revetria

2002-12-01T23:59:59.000Z

115

Convective cloud and rainfall processes over the Maritime Continent : simulation and analysis of the diurnal cycle  

E-Print Network (OSTI)

The Maritime Continent experiences strong moist convection, which produces significant rainfall and drives large fluxes of heat and moisture to the upper troposphere. Despite the importance of these processes to global ...

Gianotti, Rebecca L. (Rebecca Louise)

2013-01-01T23:59:59.000Z

116

Composite Life Cycle of Maritime Tropical Mesoscale Convective Systems in Scatterometer and Microwave Satellite Observations  

Science Conference Proceedings (OSTI)

This study examines scatterometer-observed surface wind divergence and vorticity, along with precipitable water (PW), across the life cycle of tropical maritime mesoscale convective systems (MCSs) as resolved in 0.5 data. Simple composites were ...

Brian Mapes; Ralph Milliff; Jan Morzel

2009-01-01T23:59:59.000Z

117

Microphysical Measurements from an Aircraft Ascending with a Growing Isolated Maritime Cumulus Tower  

Science Conference Proceedings (OSTI)

The development of precipitation in the top of an isolated maritime cumulus tower is traced by four rapid penetrations with an instrumented aircraft between 400 and 1000 m below the visible top of the growing tower. The hydrometeor distribution ...

Paul T. Willis; John Hallett

1991-01-01T23:59:59.000Z

118

Modeling the Aerosol Extinction versus Backscatter Relationship for Lidar Applications: Maritime and Continental Conditions  

Science Conference Proceedings (OSTI)

A model to derive functional relationships linking extinction (?) and backscatter (?) of continental and maritime aerosol at 532 nm is presented and tested. These relationships are needed to solve the single-wavelength lidar equation, where both ...

Francesca Barnaba; Gian Paolo Gobbi

2004-03-01T23:59:59.000Z

119

Fire Nature of a Subtropical Maritime Island in East Asia: Taiwan  

Science Conference Proceedings (OSTI)

Twelve years (198596) of monthly house fire reports for 22 districts in Taiwan, a maritime subtropical island of east Asia, were analyzed to characterize its fire nature. The major effort focused on the identification of temporal variation ...

Ming-Cheng Yen; Tsing-Chang Chen

2004-04-01T23:59:59.000Z

120

Polarimetric Radar Analysis of Raindrop Size Variability in Maritime and Continental Clouds  

Science Conference Proceedings (OSTI)

During the Queensland Cloud Seeding Research Program, the CP2 polarimetric radar parameter differential radar reflectivity Zdr was used to examine the raindrop size evolution in both maritime and continental clouds. The focus of this paper is to ...

James W. Wilson; Charles A. Knight; Sarah A. Tessendorf; Courtney Weeks

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Heat Budgets of Analyses and Forecasts of an Explosively Deepening Maritime Cyclone  

Science Conference Proceedings (OSTI)

Diagnosis of the conditions associated with explosive maritime cyclogenesis is hindered by the lack of observations. A heat budget approach with analyses and forecasts for a rapid cyclogenesis event during the FGGE period is used in this study. ...

Chi-Sann Liou; Russel L. Elsberry

1987-09-01T23:59:59.000Z

122

Influence of ENSO on the Diurnal Cycle of Rainfall over the Maritime Continent and Australia  

Science Conference Proceedings (OSTI)

This study examines the influence of ENSO on the diurnal cycle of rainfall during boreal winter for the period 19982010 over the Maritime Continent (MC) and Australia using Tropical Rainfall Measuring Mission (TRMM) and reanalysis data. The ...

Surendra P. Rauniyar; Kevin J. E. Walsh

2013-02-01T23:59:59.000Z

123

Evolution of Peaks in the Spectral Distribution of Raindrops from Warm Isolated Maritime Clouds  

Science Conference Proceedings (OSTI)

Two and one-half years of observations and measurements of isolated maritime clouds in Guadeloupe (Lesser Antilles) are presented. Raindrop spectra are measured on the ground with a Joss device and an Epson PX8 Analyser. The greatest rainfall ...

C. Asselin De Beauville; R. H. Petit; G. Marion; J. P. Lacaux

1988-11-01T23:59:59.000Z

124

Principal Component Analysis of Observed and Modeled Diurnal Rainfall in the Maritime Continent  

Science Conference Proceedings (OSTI)

Principal component analysis (PCA) is able to diagnose the diurnal rain cycle in the Maritime Continent into two modes that explain most of the diurnal variability in the region. The first mode results from the differential variation in potential ...

Chee-Kiat Teo; Tieh-Yong Koh; Jeff Chun-Fung Lo; Bhuwan Chandra Bhatt

2011-09-01T23:59:59.000Z

125

Assessing the impact of automated path planning aids in the maritime community  

E-Print Network (OSTI)

In the area of merchant maritime navigation, electronic charts are a relatively new tool. As a result, navigational path planning environments that allow users to manually enter a path onto an electronic chart are becoming ...

Buchin, Mariela E

2009-01-01T23:59:59.000Z

126

Preserving the Submerged and Coastal Maritime Heritage of the United States  

E-Print Network (OSTI)

The United States is a nation founded upon a maritime heritage that allowed for the early colonies to form, trade, expand their frontiers and defend themselves. The material remains of this legacy are dispersed across the continent in inland waters, along coasts, and in the depths of the sea. This dissertation aims at presenting a structural overview and assessment of efforts designed at preserving, enhancing, and learning from the material remains of this maritime heritage. The study reviews national and state laws and regulations that apply to such resources, which together create a mosaic of preservation mandates. Discussion of the legal framework is enhanced through incorporation of current issues and examples, and leads to a better understanding of the research element of the study based on a maritime heritage questionnaire distributed to over 100 organizations nationwide. The maritime heritage questionnaire serves as the fundamental original research component of the dissertation, and through it this overview incorporates input from organizations in the public sector, universities, museums, non-profit organizations, avocational groups, and cultural resource management firms. These diverse perspectives offer insights into the current state of the field, identify legislative or other gaps, and suggest areas where efforts need to be redoubled in order to preserve the nation's tangible connection with its maritime past. Together, the legislative overview and professional stakeholder input lead to a set of proposals through which the preservation of the nation's submerged and coastal maritime heritage resources can be enhanced.

Catsambis, Alexis

2012-08-01T23:59:59.000Z

127

and Acting NOAA Administrator  

NLE Websites -- All DOE Office Websites (Extended Search)

30 30 th 9:00-9:30 Welcome * Dr. Kathryn Sullivan, Acting Under Secretary of Commerce for Oceans and Atmosphere and Acting NOAA Administrator 9:30-10:30 What does Open Data Look Like? This session will provide some case studies of the use of open data to illustrate some of the issues associated with presentation of the data in a way which optimises its usefulness for end-users. It will consider different types of data, guiding principles, and different uses of data, including both research data and national agricultural data-sets. Moderator: * Tim Benton, Champion, UK Global Food Security Programme, UK Speakers: * Johannes Keizer, Team Leader, FAO United Nations, Italy * Dr. Sander Janssen, Wageningen, Netherlands * Dr. Rajeev Varshney, Director, Center of Excellence in Genomics (CEG), ICRISAT, Hyderabad,

128

US, UK, Russian Federation Hold Trilateral Nuclear Security Best...  

National Nuclear Security Administration (NNSA)

improve the security of nuclear materials around the world." The trilateral workshop was led by the NNSA Acting Chief of the Office of Defense Nuclear Security, the Rosatom Deputy...

129

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

130

Multi-channel transmission with efficient delivery of routing information in maritime WiMAX mesh networks  

Science Conference Proceedings (OSTI)

There is a lack of broadband wireless network in sea to meet the increasing needs of modern maritime users and we have envisaged WiMAX mesh networks for high-speed and low-cost ship-to-ship/shore communications. In such a maritime WiMAX mesh network, ... Keywords: IEEE Std 802.16-2004, broadband wireless access, maritime communications, mesh network, multi-channel transmission

Ming-Tuo Zhou; Hiroshi Harada; Peng-Yong Kong; Chee-Wei Ang; Yu Ge; J. S. Pathmasuntharam

2009-06-01T23:59:59.000Z

131

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

132

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

133

Recovery Act  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 3 Recovery Act Buy American Requirements for Information Needed from Financial Assistance Applicants/Recipients for Waiver Requests Based on Unreasonable Cost or Nonavailability Applicants for and recipients of financial assistance funded by the Recovery Act must comply with the requirement that all of the iron, steel, and manufactured goods used for a project for the construction, alteration, maintenance, or repair of a public building or public work be produced in the United States, unless the head of the agency makes a waiver, or determination of inapplicability of the Buy American Recovery Act provisions, based on one of the authorized exceptions. The authorized exceptions are unreasonable cost, nonavailability, and in furtherance of the public interest. This

134

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

135

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

136

Ensuring a Secure and Robust Cyber Infrastructure (+$43.4 ...  

Science Conference Proceedings (OSTI)

... the Federal Information Security Management Act are ... the President's FY 2012 budget calls for ... National Program Office for the National Strategy for ...

2011-02-14T23:59:59.000Z

137

NIST Activities in Support of the Energy Independence and Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of the Energy Independence and Security Act (EISA) of 2007 Revitalizing the electric power grid has become one of our Nation's top priorities, promising to reduce our...

138

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

139

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

140

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

142

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

143

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

144

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

145

National Nuclear Security Administration Pantex Site Office  

NLE Websites -- All DOE Office Websites (Extended Search)

96206) and the Atomic Energy Act of 1954 ("AEA"), 42 U.S.C. 201 1 et. seq, applicable DOE Orders governing classified and national security information, and applicable...

146

Energy Policy Act of 2005  

NLE Websites -- All DOE Office Websites (Extended Search)

R. 6 One Hundred Ninth Congress of the United States of America A T T H E F I R S T S E S S I O N Begun and held at the City of Washington on Tuesday, the fourth day of January, two thousand and five An Act To ensure jobs for our future with secure, affordable, and reliable energy. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE.-This Act may be cited as the ''Energy Policy Act of 2005''. (b) TABLE OF CONTENTS.-The table of contents for this Act is as follows: Sec. 1. Short title; table of contents. TITLE I-ENERGY EFFICIENCY Subtitle A-Federal Programs Sec. 101. Energy and water saving measures in congressional buildings. Sec. 102. Energy management requirements.

147

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

148

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

149

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

150

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

151

Supply chain security along the Columbia River : an analysis of maritime supply chain security with respect to communication between security experts  

E-Print Network (OSTI)

The amount of cargo that enters the US border is at an all time high. Cargo containers and vessel shipments enter the US from all over the world. Tracking these shipments from their origin to destination requires professional ...

Sichel, Alexander R. (Alexander Russell)

2005-01-01T23:59:59.000Z

152

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

153

The maintenance of equipment painting in maritime oil platforms is an expensive and  

E-Print Network (OSTI)

to the platform in order to evaluate the conditions of the equipment, estimate the necessary amount of paint on the platform, simplifying and reducing the costs of the process. This work presents the solution createdAbstract The maintenance of equipment painting in maritime oil platforms is an expensive

Barbosa, Alberto

154

Planning maritime logistics concepts for offshore wind farms: a newly developed decision support system  

Science Conference Proceedings (OSTI)

The wind industry is facing new, great challenges due to the planned construction of thousands of offshore wind turbines in the North and Baltic Sea. With increasing distances from the coast and rising sizes of the plants the industry has to face the ... Keywords: assembly, installation, installation vessel, logistics concepts, logistics strategies, maritime supply chain, offshore wind, production, simulation

Kerstin Lange; Andr Rinne; Hans-Dietrich Haasis

2012-09-01T23:59:59.000Z

155

Relationships between the Maritime Continent Heat Source and the El NioSouthern Oscillation Phenomenon  

Science Conference Proceedings (OSTI)

Various earlier studies have demonstrated that rainfall in the Maritime ContinentIndonesia region is strongly related to the El NioSouthern Oscillation (ENSO) during the dry half of the year but has a very weak association with ENSO during the ...

John L. McBride; Malcolm R. Haylock; Neville Nicholls

2003-09-01T23:59:59.000Z

156

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

157

TFC-0010- In the Matter of National Security Archive  

Energy.gov (U.S. Department of Energy (DOE))

The National Security Archive filed an Appeal from a determination that the National Nuclear Security Administration (NNSA) issued on April 21, 2011. In that determination, NNSA denied in part a request for information that the National Security Archive had submitted on November 29, 2006, pursuant to the Freedom of Information Act (FOIA), 5 U.S.C. 552.

158

Edward Bruce Held | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Edward Bruce Held | National Nuclear Security Administration Edward Bruce Held | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Leadership > Edward Bruce Held Edward Bruce Held Acting Administrator and Acting Undersecretary for Nuclear Security Bruce Held Bruce Held is the Acting Undersecretary for Nuclear Security with

159

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

160

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Climate VISION: Security and Privacy Notices  

Office of Scientific and Technical Information (OSTI)

SECURITY AND PRIVACY NOTICES SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of

162

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

163

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

164

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

165

Radiation Protection Act (Pennsylvania)  

Energy.gov (U.S. Department of Energy (DOE))

This Act combines the radiation safety provisions of The Atomic Energy Development and Radiation Control Act and the Environmental Radiation Protection Act, and empowers the Department of...

166

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

167

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

168

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

169

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

170

Future of Energy SecurityFuture of Energy Security Rajan Gupta  

E-Print Network (OSTI)

Future of Energy SecurityFuture of Energy Security Rajan Gupta Theoretical Division Los Alamos the darkness #12;A mind-boggling global infrastructure (~$15 trillion) provides energy/mobility to ~3.5 billion Hydro Nuclear #12;Fossil fuels and Environment In the 20th century we started to act on pollution

171

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

172

Operations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Operations Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Operations Operations NNSA's Emergency Response Operations program acts as the headquarters command and control, functioning as the coordinating focal point for all

173

Operations | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Operations Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Operations Operations NNSA's Emergency Response Operations program acts as the headquarters command and control, functioning as the coordinating focal point for all

174

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

175

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

176

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

177

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

178

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

179

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

180

Small-Scale Cloud Activity over the Maritime Continent and the Western Pacific as Revealed by Satellite Data  

Science Conference Proceedings (OSTI)

Cloud systems over the Maritime Continent and the tropical western Pacific defined by the Geostationary Meteorological Satellite (GMS) were tracked, and their evolution was compared with cloud parameters [e.g., minimum blackbody brightness ...

Yoshimi Kondo; Atsushi Higuchi; Kenji Nakamura

2006-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Large-Scale Influences on the Evolution of Winter Subtropical Maritime Cyclones Affecting Australias East Coast  

Science Conference Proceedings (OSTI)

Subtropical maritime low pressure systems frequently impact Australias eastern seaboard. Closed circulation lows in the Tasman Sea region are termed East Coast Cyclones (ECC); they can evolve in a range of climatic environments and have proven ...

Stuart A. Browning; Ian D. Goodwin

2013-07-01T23:59:59.000Z

182

Influence of the Summer Marine Layer on Maritime Chaparral and Implications for Conservation Policy in the California Coastal Zone  

E-Print Network (OSTI)

dry season variables). Climate zones are Maritime (n = 25),238) unique to each climate zone group (inside circles),variables by climate zones 85 Fig. 10 Non-metric

Vasey, Michael Charles

2012-01-01T23:59:59.000Z

183

Diurnal Lightning Variability over the Maritime Continent: Impact of Low-Level Winds, Cloudiness, and the MJO  

Science Conference Proceedings (OSTI)

Lightning over the Maritime Continent exhibits a pronounced diurnal cycle. Daytime and evening lightning occurs near coastlines and over mountain slopes, driven by sea and valley breezes. Nocturnal and morning thunderstorms are touched off where ...

Katrina S. Virts; John M. Wallace; Michael L. Hutchins; Robert H. Holzworth

2013-10-01T23:59:59.000Z

184

Scale Interaction of the Diurnal Cycle of Rainfall over the Maritime Continent and Australia: Influence of the MJO  

Science Conference Proceedings (OSTI)

The influence of the MJO on the phase and amplitude of the diurnal cycle of rainfall during Australian summer [DecemberFebruary (DJF)] over the Maritime Continent (MC) and northern Australia is investigated using the Tropical Rainfall Measuring ...

Surendra P. Rauniyar; Kevin J. E. Walsh

2011-01-01T23:59:59.000Z

185

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

186

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

187

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

188

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

189

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

190

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

191

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

192

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

193

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

194

Legal aspects of the maritime transport of radioactive materials its regulation in Mexico  

E-Print Network (OSTI)

This work has the object to analyse the International as much as National legal frameworks, the scopes and limits of the instruments which form it as well as the congruous that exist between them and the situation which actually prevails in the maritime transport field of radioactive materials in worldwide level and in Mexico taking into account the technical advances, the operational experience and radiological protection principles. In the chapter 1, the background on the uses of nuclear energy are described and its development by more of fifty years. The chapter 2 analyses about the establishment of nuclear technologies in Mexico as well as their evolution in medicine, agriculture, research and electric power generation areas. In chapter 3 it was analysed the role what the International Organizations have been playing for the establish of an International legal framework in the maritime transport of radioactive materials field. In the chapter 4, the International legal framework was analysed which is appli...

Aguilar, S

2001-01-01T23:59:59.000Z

195

Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Secretary for Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, July 21, 2009. Common concern that vulnerabilities exist within the electric system and that the Department of

196

Bond Amendment, Security Clearances - January 1, 2008 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bond Amendment, Security Clearances - January 1, 2008 Bond Amendment, Security Clearances - January 1, 2008 Bond Amendment, Security Clearances - January 1, 2008 January 1, 2008 In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C.

197

THE EXPERIMENTAL BERYLLIUM OXIDE REACTOR. MARITIME GAS-COOLED REACTOR PROGRAM  

SciTech Connect

LIUM OXIDE REACTOR. MARITIME GAS-COOLED The Experimental Beryllium Oxide Reactor, EBOR, will be constructed at the National Reactor Testing Station as the AEC portion of the joint Maritime Administration--AEC Maritime Gas Cooled Reactor Program. The ultimate goal of the Program is the development of nuclear power plants employing a helium cooled and beryllium oxide moderated reactor directly coupled to a closed cycle gas turbine. The objective is to obtain compact nuclear engines suitable for use either in a merchant ship propulsion system or an intermediate size central station power plant in the 20 to 100 Mw(e) size range. The EBOR is a l0 Mw(t) test of the basic fuel element and moderator designs. It is capable of being up-graded in power at a later date to a test of the nuclear reactor turbine concept. The objective of the experiment is outlined. The principal reactor components to be tested and the test facility are described. (auth)

Moore, W.C.

1961-07-01T23:59:59.000Z

198

S. 2166: An act to reduce the Nation's dependence on imported oil, to provide for the energy security of the Nation, and for other purposes, introduced in the United States Senate and House of Representatives, One Hundred Second Congress, Second Session, February 19, 1992  

SciTech Connect

This bill, also referred to as the National Energy Security Act of 1992, contains the following: Title I - Findings and purposes: Climate protection goals,least-cost energy strategy, and Director of climate protection: Title II - Definitions; Title III (none); Title IV - Fleets and alternative fuels: Alternative fuel fleets, Alternative fuels, Mass transit and training; Title V - Renewable energy: CORECT and COEECT, Renewable energy initiatives, Hydropower; Title VI - Energy efficiency: Industrial, commercial, and residential, Federal energy management, Utilities, State, local, insular, and tribal energy assistance, LIHEAP options pilot program, Consultative commission on western hemisphere energy and environment; Title VII (none); Title VIII - Advanced nuclear reactor commercialization; Title IX - Nuclear reactor licensing; Title X - Uranium: Uranium enrichment, Uranium; Title XI - Natural gas; Title XII - Outer continental shelf: Coastal communities impact assistance, Coastal resources enhancement fund, relationship to other law, Prohibition of leasing and preleasing activity; Title XIII - Research, development, demonstration and commercialization activities; Title XIV - Coal and coal technology, Electricity, Innovative technology transfer; Title XV - Public Utility Holding Company Act reform; Title XVI - Strategic Petroleum Reserve; Title XVII - Stratospheric ozone depletion; Title XVIII - Indian energy resource development commission; Title XIX - General provisions.

Not Available

1992-01-01T23:59:59.000Z

199

ARM - Recovery Act Instruments  

NLE Websites -- All DOE Office Websites (Extended Search)

ActRecovery Act Instruments ActRecovery Act Instruments Recovery Act Logo Subscribe FAQs Recovery Act Instruments Recovery Act Fact Sheet March 2010 Poster (PDF, 10MB) External Resources Recovery Act - Federal Recovery Act - DOE Recovery Act - ANL Recovery Act - BNL Recovery Act - LANL Recovery Act - PNNL Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send Recovery Act Instruments These pages provide a breakdown of the new instruments planned for installation among the permanent and mobile ARM sites. In addition, several instruments will be purchased for use throughout the facility and deployed as needed. These are considered "facility spares" and are included in the table below. View All | Hide All ARM Aerial Facility Instrument Title Instrument Mentor Measurement Group Measurements

200

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

202

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

203

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

204

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

205

Cyber Security Standards.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

206

Federal Energy Management Program: Energy Policy Act of 2005  

NLE Websites -- All DOE Office Websites (Extended Search)

2005 to someone by E-mail 2005 to someone by E-mail Share Federal Energy Management Program: Energy Policy Act of 2005 on Facebook Tweet about Federal Energy Management Program: Energy Policy Act of 2005 on Twitter Bookmark Federal Energy Management Program: Energy Policy Act of 2005 on Google Bookmark Federal Energy Management Program: Energy Policy Act of 2005 on Delicious Rank Federal Energy Management Program: Energy Policy Act of 2005 on Digg Find More places to share Federal Energy Management Program: Energy Policy Act of 2005 on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act Executive Order 13423 Energy Policy Act of 2005 Executive Order 13221 Energy Policy Act of 1992

207

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

208

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

209

'Rocks and storms I'll fear no more': Anglo-American maritime memorialization, 1700-1940  

E-Print Network (OSTI)

Nautical archaeology has made remarkable advances since its inception half a century ago, but one area in need of more attention is the examination of cultural aspects of seafaring. This dissertation advances understanding of eighteenth- through early-twentieth century British and American maritime culture by exploring traditional memorialization practices. Interpretations are based primarily on analysis of 412 maritime memorials recorded during two archaeological surveys in Great Britain and the United States. In addition, primary accounts from the Age of Sail are utilized to place maritime memorialization into its proper cultural and historical context. Research reveals three major themes in Anglo-American maritime memorialization. First, memorials show a striking concern for the dangers and hardships of life at sea. Numerous memorials describe the perils of the natural world and the group values that mariners developed to cope with the ever-present possibility of sudden death. Such values include attention to duty, courage, group loyalty, self-sacrifice, and pride. Second, maritime communities faced the problem of commemorating those who never returned from the sea. Many sailors were lost at sea or died aboard ship or in distant lands. In the vast majority of such cases, the body was never returned home, and many did not receive proper burial. As a result, family members and fellow sailors created memorials to honor the lost and to symbolically lay the deceased to rest. Evidence indicates, however, that such attempts were not entirely satisfactory. Many epitaphs lament the fact that empty graves cannot provide an adequate substitute for missing bodies. Finally, investigation revealed a significant increase in religious sentiment on maritime memorials from the mid-nineteenth century until the end of the Age of Sail. It is suggested that the increase in maritime religious sentiment was linked to nineteenth-century religious reform movements. The prevalence of religious imagery and inscriptions on maritime memorials during this time, however, probably does not indicate that most sailors became religious. Rather, most religious maritime memorials were erected by sailors' families. This suggests that maritime families turned to religion as a source of comfort when faced with the deaths of loved ones at sea.

Stewart, David James

2005-05-01T23:59:59.000Z

210

Recovery Act | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 22, 2011 June 22, 2011 Recovery Act SGDP View a map which combines the above two maps View the full list of selected projects June 22, 2011 Recovery Act: Smart Grid Interoperability Standards and Framework May 18, 2009 Locke, Chu Announce Significant Steps in Smart Grid Development WASHINGTON - U.S. Commerce Secretary Gary Locke and U.S. Energy Secretary Steven Chu today announced significant progress that will help expedite development of a nationwide "smart" electric power grid. June 22, 2011 Strategic Plan A modern, reliable, secure, affordable and environmentally sensitive national energy infrastructure is fundamental to our quality of life and energy future. Yet since 1982, growth in peak demand for electricity has exceeded the growth and development of our electric grid. This demand

211

Federal Energy Management Program: Recovery Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Recovery Act Recovery Act The American Recovery and Reinvestment Act of 2009 included funding for the Federal Energy Management Program (FEMP) to facilitate the Federal Government's implementation of sound, cost-effective energy management and investment practices to enhance the nation's energy security and environmental stewardship. FEMP completed nearly 120 technical assistance projects through this effort. FEMP national laboratory teams and contractor service providers visited more than 80 Federal sites located throughout the U.S. The site visits were a key component of FEMP Recovery Act funded technical assistance activity, which provided more than $13.2 million in funding for direct technical assistance to energy managers across the Federal Government. This service helped agencies accelerate their Recovery Act projects and make internal management decisions for investment in energy efficiency and deployment of renewable energy.

212

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

213

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

214

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

215

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

216

Before the House Subcommittee on Counterterrorism and Intelligence- Committee on Homeland Security  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Implications of Refinery Closures for U.S. Homeland Security and Critical Infrastructure Safety By: Howard Gruenspecht, Acting Administrator of the Energy Information Administration

217

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

218

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

219

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

220

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Marine accident report - collision of greek bulk carrier M/V Irene S. Lemos and Panamanian bulk carrier M/V Maritime Justice, lower Mississippi River, near New Orleans, Louisiana, November 9, 1978  

SciTech Connect

At 0640 c.s.t., on November 9, 1978, the Greek bulk carrier M/V IRENE S. LEMOS and the Panamanian bulk carrier M/V MARITIME JUSTICE collided in the lower Mississippi River at mile 78.3 AHP, about 15 statute miles below New Orleans, Louisiana. Because of dense fog, the visibility at the time of the collision was less than 400 feet. The vessels struck nearly head-on, damaging the bows of both vessels. There were no deaths or injuries. Cost of repairs to the two vessels was estimated at $4 million. About 1,800 barrels of fuel oil were discharged into the Mississippi River and resulted in local health officials securing the municipal water intake 1/2 mile downriver. The National Transportation Safety Board determines that the probable cause of the accident was the poor judgment of the pilots of the MARITIME JUSTICE and the IRENE S. LEMOS when they agreed to meet and pass, in near zero visibility conditions, at English Turn Bend where the risk of collision was much greater than in a straight portion of the river and the failure of the vessels to move to the extreme right of the channel.

Not Available

1980-02-14T23:59:59.000Z

222

Privacy & Security Notice | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy & Security Notice Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this web site for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and

223

JGI - IMG-ACT  

NLE Websites -- All DOE Office Websites (Extended Search)

Education Microbial Genome Analysis Microbial Functional Genomics IMG-ACT IMG Annotation Collaboration Toolkit (IMG-ACT) is a multi-platform toolkit created to assist instructors...

224

NO FEAR Act Notice  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy's notice for the No FEAR Act. To learn more about the No FEAR Act, visit this page.

225

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

226

National Nuclear Security Administration Contractor Governance, IG-0881  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Contractor Governance DOE/IG-0881 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 February 19, 2013 MEMORANDUM FOR THE ACTING ADMINISTRATOR, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "National Nuclear Security Administration Contractor Governance" INTRODUCTION Since July 2007, the Department of Energy (Department) and the National Nuclear Security Administration (NNSA) have required contractors to implement self-assessment systems to measure performance and help ensure effective and efficient mission accomplishment. Each

227

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

228

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

229

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

230

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

231

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

232

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

233

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

234

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

235

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

236

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

237

Freedom of Information Act (FOIA) and Privacy Act Requests |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests Calibration Facilities Ecosystem Management Team Environmental...

238

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

239

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

240

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

242

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

243

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

244

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

245

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

246

Bruce Held visits Y-12 National Security Complex | National Nuclear  

National Nuclear Security Administration (NNSA)

Held visits Y-12 National Security Complex | National Nuclear Held visits Y-12 National Security Complex | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Bruce Held visits Y-12 National Security Complex Bruce Held visits Y-12 National Security Complex Posted By Office of Public Affairs Acting NNSA Administrator and Acting Undersecretary for Nuclear Security

247

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

248

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

249

Security-by-design handbook.  

SciTech Connect

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

250

Control Systems Security Test Center - FY 2004 Program Summary  

Science Conference Proceedings (OSTI)

In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nations critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

Robert E. Polk; Alen M. Snyder

2005-04-01T23:59:59.000Z

251

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

252

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

253

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

254

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

255

Trade, piracy, and naval warfare in the central Mediterranean: the maritime history and archaeology of Malta  

E-Print Network (OSTI)

Located approximately in the middle of the central Mediterranean channel, the Maltese Archipelago was touched by the historical events that effected the political, economic and cultural environment of Europe, North Africa, and the Middle East. The islands were close to the major maritime routes throughout history and they were often on the border between clashing military, political, religious, and cultural entities. For these reasons, the islands were presumed to have been strategically and economically important, and, thus, frequented by ships. An underwater archaeological survey around the archipelago revealed the scarcity of submerged cultural remains, especially pertaining to shipping and navigation. Preliminary findings elucidate a story that contrasts with the picture presented by modern history and historiography. In this sense, a comparison of the underwater archaeological data with the information gathered through a detailed study of Maltese maritime history clearly shows that the islands were attributed an exaggerated importance in historical texts, due to political and religious trends that are rooted in the period during which the islands were under the control of the Order of Saint John. An objective investigation of the historical and archaeological material provides a more balanced picture, and places the islands in a Mediterranean-wide historical framework from the first colonization of the archipelago eight thousands years ago to the twentieth century.

Atauz, Ayse Devrim

2005-05-01T23:59:59.000Z

256

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

257

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

258

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

259

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

260

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

262

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

263

Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues  

SciTech Connect

This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nations current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

Wayne F. Boyer; Scott A. McBride

2009-04-01T23:59:59.000Z

264

Coastal Management Act (Georgia)  

Energy.gov (U.S. Department of Energy (DOE))

The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

265

Security Operations, Laboratory Protection Division, Brookhaven National  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Operations Security Operations Homepage Brookhaven ID Badges, Passes, & Vehicle Stickers Hours of Operation Points of Contact Unclassified Foreign Visits and Assignments: FAQs BNL Site Access Main Gate Access Forms Security Operations L. Butera, Manager Brookhaven National Laboratory Bldg. 50 - P.O. Box 5000 Upton, NY 11973-5000 (631) 344-4691 E-mail: lbutera@bnl.gov Security Operations Mission Statement: To protect DOE special nuclear materials, classified matter, sensitive information, and certain sensitive property against theft, diversion, or destruction; to prevent the sabotage of programs that could result in significant scientific or financial impact; to prevent the malevolent release of hazardous materials including radiological, chemical, and infectious agents or other criminal acts that would endanger employees, the public, and the environment.

266

Safety and Security Enforcement Process Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SAFETY AND SECURITY SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE ENFORCEMENT PROCESS OVERVIEW PREFACE i Preface Over the years, the United States Congress has given the Secretary of Energy authority to promulgate rules to provide assurance that U.S. Department of Energy (DOE) contractors provide a workplace free from recognized hazards, that the operations of our nuclear facilities minimize potential danger to life and property, and that our classified matter is protected from disclosure in the interest of national security. Congress institutionalized these mandates through amendments to the Atomic Energy Act, and Congress also provided DOE with enforcement authority to assure compliance

267

NIST Organic Act  

Science Conference Proceedings (OSTI)

... brush fires, fires underground, oil blowout fires ... Personnel Act of 1970 who are ... and manufacturing techniques, including supply chain integration ...

2013-02-14T23:59:59.000Z

268

Firms' information security investment decisions: Stock market evidence of investors' behavior  

Science Conference Proceedings (OSTI)

In the information society, it is important for firms to manage their core information resources securely. However, the difficulty of measuring the return on an IT security investment is one of the critical obstacles for firms in making such investment ... Keywords: Abnormal returns, Event methodology, Information security investment, Investors' behavior, Market value, Sarbanes-Oxley Act (SOX)

Sangmi Chai; Minkyun Kim; H. Raghav Rao

2011-03-01T23:59:59.000Z

269

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

270

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

271

Energy Independence and Security Act of 2007: New and Enhanced...  

NLE Websites -- All DOE Office Websites (Extended Search)

non- building applications Subtitle C - Energy Efficiency in Federal Agencies Sec. 521. Installation of PV System at DOE HQ &1; Directs GSA to install a PV system (Sun Wall Design...

272

COMPUTER SECURITY ACT OF 1987 June 11, 1987 ...  

Science Conference Proceedings (OSTI)

... for a Computer Systems Advisory Board to identify ... Executive Secretary: John C. Wobensmith. ... of Transportation, Department of Energy, Director of ...

2007-09-19T23:59:59.000Z

273

Freedom of Information Act Related Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

agency established by Congress in 1988 to provide safety oversight of the nuclear weapons complex operated by the DOE. National Technical Information Service A centralized...

274

2012 SG Peer Review - Recovery Act: Secure Interoperable Open...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

*Apply industry standards for communications and interfacing *Reduce peak load growth by demand response 3 December 2008 Technical Approach 4 *Establish standards based service...

275

Freedom of Information Act - Costs | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

review of documents located for responsiveness; 16% administrative costs; reproduction cost of .05 per page; and the time it took the FOIA Specialist to process the request....

276

Freedom of Information Act Related Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press...

277

Privacy Act (PA) of 1974 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

unwarranted invasions of their privacy stemming from federal agencies' collection, maintenance, use, and disclosure of personal information about them. Therefore, unlike the...

278

Energy Independence and Security Act | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

energy savings reduction to include increased use of an existing energy source by cogeneration or heat recovery, use of excess electrical or thermal energy generated from onsite...

279

Freedom of Information Act - Costs | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

described below. Commercial use requesters: Responsible for all direct costs; i.e. search for responsive documents, review of documents located for responsiveness; 16%...

280

Privacy Act Links to Relates Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

on individuals and rules agencies follow to assist individuals who request information about their records. DOE Office of Hearings and Appeals. The Department of Justice...

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Under the Energy Independence and Security Act of 2007 ...  

Science Conference Proceedings (OSTI)

... ITL provides technical expertise as a member of the Smart Grid Interoperability Panel (SGIP) Smart Grid Architecture Committee developing the ...

2011-07-21T23:59:59.000Z

282

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

283

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

284

Security-by-design handbook.  

Science Conference Proceedings (OSTI)

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

285

FOIA/Privacy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Freedom of Information Act/Privacy Act Freedom of Information Act/Privacy Act The Oak Ridge Office of Chief Counsel is responsible for administering policies, programs, and procedures to ensure DOE compliance with the Freedom of Information Act (FOIA) and the Privacy Act (PA), 5 U.S.C. 552 and 5 U.S.C. 552a, respectively. DOE continuously gathers site specific information about its facilities and record repositories. Links to DOE sites and major contractors are found at Energy.gov. The resources on these pages are provided to aid in finding answers to your questions about programs of the Department of Energy and to obtain information that is publicly available without submitting a FOIA request. If the information is not available here or on another Department website, submit a Freedom of Information Act request electronically.

286

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

287

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

288

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

289

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

290

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

291

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

292

Energy Policy Act (EPAct) of 2005  

NLE Websites -- All DOE Office Websites (Extended Search)

14-DEC-2004 14-DEC-2004 09:45 Sep 08, 2005 Jkt 039139 PO 00058 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL058.109 APPS10 PsN: PUBL058 PUBLIC LAW 109-58-AUG. 8, 2005 ENERGY POLICY ACT OF 2005 VerDate 14-DEC-2004 09:31 Sep 08, 2005 Jkt 039139 PO 00058 Frm 00002 Fmt 6580 Sfmt 6582 E:\PUBLAW\PUBL058.109 APPS10 PsN: PUBL058 119 STAT. 594 PUBLIC LAW 109-58-AUG. 8, 2005 Aug. 8, 2005 [H.R. 6] Energy Policy Act of 2005. 42 USC 15801 note. Public Law 109-58 109th Congress An Act To ensure jobs for our future with secure, affordable, and reliable energy. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE.-This Act may be cited as the ''Energy Policy Act of 2005''. (b) TABLE OF CONTENTS.-The table of contents for this Act

293

Energy Policy Act (EPAct) of 2005  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4-DEC-2004 4-DEC-2004 09:45 Sep 08, 2005 Jkt 039139 PO 00058 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL058.109 APPS10 PsN: PUBL058 PUBLIC LAW 109-58-AUG. 8, 2005 ENERGY POLICY ACT OF 2005 VerDate 14-DEC-2004 09:31 Sep 08, 2005 Jkt 039139 PO 00058 Frm 00002 Fmt 6580 Sfmt 6582 E:\PUBLAW\PUBL058.109 APPS10 PsN: PUBL058 119 STAT. 594 PUBLIC LAW 109-58-AUG. 8, 2005 Aug. 8, 2005 [H.R. 6] Energy Policy Act of 2005. 42 USC 15801 note. Public Law 109-58 109th Congress An Act To ensure jobs for our future with secure, affordable, and reliable energy. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE.-This Act may be cited as the ''Energy Policy Act of 2005''. (b) TABLE OF CONTENTS.-The table of contents for this Act

294

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

295

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

296

National Environmental Policy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

National Laboratory (ORNL) CX-ORR-13-007 SC 9172013 Timber Salvage from Pine Ridge Storm Damage CX-ORR-13-008 SC 9252013 Office of Secure Transportation Multiple Actions...

297

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

299

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

300

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

302

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

303

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

304

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

305

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

306

Notice of Availability | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Notice of Availability | National Nuclear Security Administration Notice of Availability | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Notice of Availability Home > About Us > Our Operations > NNSA Office of General Counsel > National Environmental Policy Act (NEPA) > NEPA Reading Room > Notice of Availability Notice of Availability

307

Annual Energy Outlook with Projections to 2025- Legislation and Regulations  

Gasoline and Diesel Fuel Update (EIA)

Maritime Security Act of 2002 Amendments to the Deepwater Port Act Maritime Security Act of 2002 Amendments to the Deepwater Port Act Legislation and Regulations. The Maritime Security Act of 2002 Amendments to the Deepwater Port Act The Maritime Security Act of 2002, signed into law in November 2002, amended the Deepwater Port Act of 1974 to include offshore natural gas facilities. The legislation transferred jurisdiction for offshore natural gas facilities from the FERC to the Maritime Administration and the U.S. Coast Guard, both of which were at that time under the U.S. Department of Transportation. (The Coast Guard has since been moved to the Department of Homeland Security.) The amendments in the Maritime Security Act of 2002 lowered the regulatory hurdles faced by potential developers of offshore LNG receiving terminals. Placing them under Coast Guard jurisdiction both streamlined the permitting process and relaxed regulatory requirements. Owners of offshore LNG terminals are allowed proprietary access to their own terminal capacity, removing what had once been a major stumbling block for potential developers of new LNG facilities. The Hackberry Decision, discussed below, has the same impact on onshore LNG facilities under FERC jurisdiction.

308

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

309

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

310

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

311

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

312

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

313

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

314

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

315

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

316

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

317

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

318

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

319

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

320

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

ARM - Recovery Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Act were deployed with the ARM second mobile facility (AMF2) in Steamboat Springs, Colorado. Led by the AMF2 team from Argonne National Laboratory, installation activities began...

322

Recovery Act Open House  

NLE Websites -- All DOE Office Websites (Extended Search)

Recovery Act Open House North Wind Environmental was one of three local small businesses that received Recovery Funding for projects at DOE's Idaho Site. Members of the community...

323

Stormwater Management Act (Pennsylvania)  

Energy.gov (U.S. Department of Energy (DOE))

The policy and purpose of this act is to encourage planning and management of storm water runoff in each watershed consistent with sound water and land use practices.

324

Price-Anderson Act  

Energy.gov (U.S. Department of Energy (DOE))

The Price-Anderson Act (PAA) provides a system of indemnification for legal liability resulting from a nuclear incident in connection with contractual activity for DOE.

325

PAPERWORK REDUCTION ACT SUBMISSION  

U.S. Energy Information Administration (EIA)

19. Certification for Paperwork Reduction Act Submissions On behalf of this Federal agency, I certify that the collection of information encompassed ...

326

Evaluation Report on The Department's Unclassified Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security information. It requires agencies to conduct annual reviews and evaluations of unclassified and

327

Safety and Security Enforcement Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety and Security Enforcement Program Safety and Security Enforcement Program Safety and Security Enforcement Program About Us The Office of Health, Safety and Security's Office of Enforcement and Oversight is responsible for enforcing Federal regulatory requirements pertaining to worker safety and health, nuclear safety, and classified information security programs at Department of Energy (DOE) sites. The United States Congress mandated that the Secretary of Energy promulgate these requirements in order to provide assurance that workers are protected from hazards in the workplace, the potential danger to life and property from the operation of DOE nuclear facilities is minimized, and classified matter is protected from disclosure to sustain our national security. These mandates are reflected in amendments to the Atomic Energy Act of 1954 in

328

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

329

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

330

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

331

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

332

Diurnal LandSea Rainfall Peak Migration over Sumatera Island, Indonesian Maritime Continent, Observed by TRMM Satellite and Intensive Rawinsonde Soundings  

Science Conference Proceedings (OSTI)

The diurnal cycle of rainfall and its regional variation over Sumatera Island, Indonesian Maritime Continent, are examined using Tropical Rainfall Measuring Mission (TRMM) satellite precipitation radar (PR) and intensive rawinsonde sounding data. ...

Shuichi Mori; Hamada Jun-Ichi; Yudi Iman Tauhid; Manabu D. Yamanaka; Noriko Okamoto; Fumie Murata; Namiko Sakurai; Hiroyuki Hashiguchi; Tien Sribimawati

2004-08-01T23:59:59.000Z

333

An analysis of Pre-Columbian balsa raft design to determine the suitability of such rafts for ancient maritime trade between Ecuador and Mexico  

E-Print Network (OSTI)

By approximately 100 BCE Ecuadorian traders had established extensive maritime commercial routes reaching from Chile to Colombia. Historical sources indicate that they transported their merchandise in large, ocean-going ...

Dewan, Leslie

2007-01-01T23:59:59.000Z

334

Recovery Act Workers Demolish Facility Tied to Project Pluto History |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recovery Act Workers Demolish Facility Tied to Project Pluto Recovery Act Workers Demolish Facility Tied to Project Pluto History Recovery Act Workers Demolish Facility Tied to Project Pluto History Workers recently razed a facility used in the historic Project Pluto, the latest American Recovery and Reinvestment Act accomplishment helping clean up traces of past nuclear testing at the Nevada National Security Site (NNSS). Recovery Act workers safely hauled the last demolition waste from the Pluto Disassembly Facility to disposal facilities Jan. 11. The project is slated for completion this spring after workers finish installing a concrete cap over the below-ground level where the facility stood. Recovery Act Workers Demolish Facility Tied to Project Pluto History More Documents & Publications 2010 ARRA Newsletters

335

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

336

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

337

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

338

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

339

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

340

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

NEPA Reading Room | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reading Room | National Nuclear Security Administration Reading Room | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NEPA Reading Room Home > About Us > Our Operations > NNSA Office of General Counsel > National Environmental Policy Act (NEPA) > NEPA Reading Room NEPA Reading Room Welcome to the National Nuclear Security Administration's NEPA Reading

342

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

343

Ganging up on Jolly Roger in Asia : International cooperation and maritime piracy  

E-Print Network (OSTI)

As non-traditional security threats such as terrorism and organized transnational crime gain greater prominence around the globe, the need for international cooperation against these non-state actors has consequently ...

He, Ruijie

2008-01-01T23:59:59.000Z

344

Solid Waste Management Act (Oklahoma) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Solid Waste Management Act (Oklahoma) Solid Waste Management Act (Oklahoma) < Back Eligibility Agricultural Commercial Construction Industrial Installer/Contractor Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Utility Program Info State Oklahoma Program Type Environmental Regulations Provider Oklahoma Department of Environmental Quality This Act establishes rules for the permitting, posting of security, construction, operation, closure, maintenance and remediation of solid waste disposal sites; disposal of solid waste in ways that are environmentally safe and sanitary, as well as economically feasible; submission of laboratory reports or analyses performed by certified laboratories for the purposes of compliance monitoring and testing and for

345

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

346

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

347

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

348

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

349

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

350

Cooperative Monitoring Center Occasional Paper/18: Maritime Cooperation Between India and Pakistan: Building Confidence at Sea  

SciTech Connect

This paper discusses ways in which the navies of both India and Pakistan can cooperate on issues of maritime and naval significance. Although the militaries and navies of the two countries have traditionally seen each other as rivals, international economic developments make cooperation imperative. South Asia requires an approach that can alter the existing hostile images and perceptions. This can be achieved through developing an incremental approach towards confidence building that would allow consistency and help build confidence gradually. The aim is to make confidence building a sustainable activity that would help transform hostile images and build cooperative and nonhostile relationships. This paper proposes a five-step model to suggest what the two navies can do jointly to build confidence, with the ultimate goal of naval arms control. The steps include (1) the Signaling Stage to initiate communication between the two navies, (2) the Warming-Up Stage to build confidence through nonmilitary joint ventures, (3) the Handshake Stage to build confidence between the two navies through military joint ventures, (4) the Problem-Solving Stage to resolve outstanding disputes, and (5) the Final Nod Stage to initiate naval arms control. This model would employ communication, navigation, and remote sensing technologies to achieve success.

SIDDIQA-AGHA,AYESHA

2000-11-01T23:59:59.000Z

351

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

352

Energy and Water Act  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition Letter 2004-02 - FY 2004 Le2islation Provisions (dated March 1.2004) Acquisition Letter 2004-02 - FY 2004 Le2islation Provisions (dated March 1.2004) Energy and Water Act AL-2004-02 provides guidance regarding the implementation of Section 30 I. 304. 307. 501,502, and Legislative Direction as provided in the Energy and Water Development Appropriation:) Act Pub. L, 108-137, also known as the E&W Act. RFP's for unfunded programs, UseJ' facilities, lobbying restrictions, and purchase of American made products are carried ovc:r from the FY 2003 Energy and Water Development Appropriations Act Pub, L, 108-7 {Division D), However, while the provision regarding competition still exists in the F'" 2004 legislation, the direction provided by Congress regarding the extend/compete process for 5 Management and Operating (M&O)contracts is

353

Recovery Act Recipient Reporting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Smart Grid Investment Grant Recipients Smart Grid Investment Grant Recipients November 19, 2009 1 Outline of Presentation * OMB Reporting Requirements * Jobs Guidance * FR.gov 2 Section 1512 of American Reinvestment and Recovery Act Outlines Recipient Reporting Requirements "Recipient reports required by Section 1512 of the Recovery Act will answer important questions, such as: ▪ Who is receiving Recovery Act dollars and in what amounts? ▪ What projects or activities are being funded with Recovery Act dollars? ▪ What is the completion status of such projects or activities and what impact have they had on job creation and retention?" "When published on www.Recovery.gov, these reports will provide the public with an unprecedented level of transparency into how Federal dollars are being spent and will help drive accountability for the timely,

354

CRSP Act of 1956  

NLE Websites -- All DOE Office Websites (Extended Search)

Act of 1956 Act of 1956 An act to authorize the Secretary of the Interior to construct, operate, and maintain the Colorado River storage project and participating projects, and for other purposes. (Act of April 11, 1956, ch. 203, 70 Stat. 105) [Sec. 1. Colorado River storage project.] -- In order to initiate the comprehensive development of the water resources of the Upper Colorado River Basin for the purposes, among others, of regulating the flow of the Colorado River storing water for beneficial consumptive use, making it possible for the States of the Upper Basin to utilize, consistently with the provisions of the Colorado River Compact, the apportionments made to and among them in the Colorado River Compact and the Upper Colorado River Basin Compact, respectively providing for the reclamation of arid and semiarid land, for the control of floods and for the generation of hydroelectric power, as an incident to the foregoing purposes, the Secretary of the Interior is hereby authorized:

355

Freedom of Information Act  

NLE Websites -- All DOE Office Websites (Extended Search)

FOIA FOIA Freedom of Information Act (FOIA) If you would like additional information related to your request you should contact the FOIA Requester Service Center at this location. If you submitted your request to another component of the DOE, or if you submitted a request to this office and it has been transferred to a component of the Department to be processed, please contact the FOIA Requester Service Center at that location. You may access the telephone number to the appropriate FOIA Requester Service Center at http://energy.gov/management/office-management/operational-management/freedom-information-act/foia-contacts. Code of Federal Regulations (CFR) for the Freedom of Information Act is 10 CFR 1004 Freedom of Information Act of 1966 and Amendments (as of Jan. 2, 1991)

356

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

357

American Recovery and Reinvestment Act Information Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Recovery and Reinvestment Act Recovery and Reinvestment Act Information Services American Recovery and Reinvestment Act American Recovery and Reinvestment Act Information Services American Recovery and Reinvestment Act American Recovery and Reinvestment Act Information Services American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act

358

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

359

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

360

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

362

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

363

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

364

Los Alamos National Laboratory Environmental Management Activities Funded by the Recovery Act, OAS-RA-11-15  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Los Alamos National Laboratory Los Alamos National Laboratory Environmental Management Activities Funded by the Recovery Act OAS-RA-11-15 August 2011 Department of Energy Washington, DC 20585 August 25, 2011 MEMORANDUM FOR THE MANAGER, LOS ALAMOS SITE OFFICE, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: George W. Collard Assistant Inspector General for Audits SUBJECT: INFORMATION: Audit Report on "Los Alamos National Laboratory Environmental Management Activities Funded by the Recovery Act" BACKGROUND In February 2009, the American Recovery and Reinvestment Act of 2009 (Recovery Act) was enacted. The Department of Energy's (Department) National Nuclear Security Administration (NNSA) received approximately $212 million in Recovery Act funds from the Office of

365

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

366

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

367

Flood Disaster Protection Act of 1973 | Open Energy Information  

Open Energy Info (EERE)

Disaster Protection Act of 1973 Disaster Protection Act of 1973 Jump to: navigation, search Statute Name Flood Disaster Protection Act of 1973 Year 1973 Url [[File:|160px|link=]] Description References FDPA Text[1] The National Flood Insurance Program (NFIP) is administered primarily under two statutes: the National Flood Insurance Act of 1968 and the Flood Disaster Protection Act of 1973 (FDPA). The NFIP is administered by a department of the Federal Emergency Management Agency (FEMA), the Federal Insurance Administration (FIA). The FDPA requires federal financial regulatory agencies to adopt regulations prohibiting their regulated lending institutions from making, increasing, extending or renewing a loan secured by improved real estate or a mobile home located or to be located in a SFHA in a community participating in the NFIP unless the property

368

Statement of Patricia Hoffman Acting Assistant Secretary for Electricity  

NLE Websites -- All DOE Office Websites (Extended Search)

Statement of Patricia Hoffman Acting Assistant Secretary for Statement of Patricia Hoffman Acting Assistant Secretary for Electricity Delivery and Energy Reliability, Before the Committee on Energy and Natural Resources U.S. Senate, May 7, 2009. Statement of Patricia Hoffman Acting Assistant Secretary for Electricity Delivery and Energy Reliability, Before the Committee on Energy and Natural Resources U.S. Senate, May 7, 2009. Statement of Patricia Hoffman Acting Assistant Secretary for Electricity Delivery and Energy Reliability, Before the Committee on Energy and Natural Resources U.S. Senate, May 7, 2009. On the cyber security issues facing the electric industry and on emergency authorities to protect critical electric infrastructure. Statement of Patricia Hoffman Acting Assistant Secretary for Electricity Delivery and Energy Reliability, Before the Committee on Energy and Natural

369

Energy Policy Act of 2005 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requirements by Regulation » Energy Policy Requirements by Regulation » Energy Policy Act of 2005 Energy Policy Act of 2005 October 8, 2013 - 1:46pm Addthis The Energy Policy Act of 2005 (EPAct 2005) established a number of energy management goals for Federal facilities and fleets. It also amended portions of the National Energy Conservation Policy Act (NECPA). This content is intended as a reference only. You should refer to the full text of EPAct 2005 for more details or other sections relevant to your work. Please note, the Energy Independence and Security Act of 2007 (EISA 2007) and Executive Order (E.O.) 13423 have been issued subsequent to the passage of EPAct 2005. These authorities update many of the energy management requirements of EPAct 2005. Metering and Reporting Section 103 of EPAct 2005 includes the following requirements surrounding

370

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

371

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

372

Office of Departmental Personnel Security - Policy and Procedures  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy and Procedures Policy and Procedures Office of Departmental Personnel Security DOE Directives Clearance Access Matrix Executive Order 13467-Reforming Intelligence Reform and Terroroism Prevention Act of 2004 Extension of DOE N 470.5, Bond Renewal Final Notice Would Counseling/Treatment Cost Me My Security Clearance? 2005 Adjudicative Guidelines Implementation Executive Order 12968 10 CFR 710 Reciprocity Checklist * *This Checklist is provided pursuant to Appendix B of DOE O 472.2, Personnel Security, and must be utilized in accordance with the contents of that directive. This Checklist was issued by the Office of Management and Budget for use nationally across the Federal Government. Department of Energy Administrative Records Schedule 18: Security, Emergency Planning, and Safety Records, September 2010, Revision 2 (Personnel Security Records start on Page 17)

373

Interactive montages of sprites for indexing and summarizing security video  

E-Print Network (OSTI)

In this video we present a new model of interaction for indexing and visualizing video in the context of security applications. We wish to index security video that contains relatively rare but important events, such as security video taken from large public or industrial facilities (e.g. a nuclear power plant) or exterior home security video from a residential neighborhood. We present a method of indexing video by arranging irregularly shaped icons or sprites into a montage representing motion events or security events within the original video scene. The sprites in the montage are used as an index into the original video. We also generate video montages to summarize video in which motion events are compressed and overlayed in a video of shorter time duration. This summary video also acts as an index into the original video stream.

Chris Pal; Nebojsa Jojic

2005-01-01T23:59:59.000Z

374

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

375

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

376

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

377

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

378

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

379

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

380

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

ACT Update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ACT Update ACT Update ACT September 2011.pdf More Documents & Publications C-340 Complex D&D Final Lessons Learned (Post CD-4), Environmental Management Cleanup, Sep 2011 Plain...

382

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

383

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

384

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

385

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

386

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

387

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

388

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

389

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

390

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

391

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

392

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

393

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

394

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

395

The Affordable Care Act:  

NLE Websites -- All DOE Office Websites (Extended Search)

Affordable Care Act: Affordable Care Act: Preventive Services at 100% Preventive Care Services Covered Without Cost-sharing - Without Copay, Coinsurance or Deductible The Affordable Care Act requires non-grandfathered health plans and policies to provide coverage for "preventive care services" 1 without cost-sharing (such as coinsurance, deductible or copayment), when the member uses a network provider. Services may include screenings, immunizations, and other types of care, as recommended by the federal government. Blue Cross and Blue Shield of New Mexico (BCBSNM) is committed to implementing coverage changes to meet ACA requirements as well as the needs and expectations of our members. General Highlights of New Regulations * Applies to group health plans including insured and self-

396

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

397

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

398

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

399

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

400

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

402

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

403

Massachusetts Clean Air Act (Massachusetts)  

Energy.gov (U.S. Department of Energy (DOE))

The Act contains regulations to prevent the pollution and contamination of the atmosphere. The Act establishes a contiguous metropolitan pollution control district, comprised of towns in the...

404

American Recovery and Reinvestment Act  

Energy.gov (U.S. Department of Energy (DOE))

Here is one compliance agreement for EMs American Recovery and Reinvestment Act Program on accelerated milestones for the Recovery Act program.

405

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

406

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

407

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

408

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

409

Safeguards & Security | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Safeguards & Security Safeguards & Security Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Services Safeguards & Security Print Text Size: A A A RSS Feeds FeedbackShare Page Security and Emergency Management staff ensures the people, materials, and information at DOE sites remain safe and secure. The Office of Science complex contains some of the U.S. Department of Energy's most important assets, and these organizations ensure the security of these crucial and

410

Rehabilitation Act of 1973  

Energy.gov (U.S. Department of Energy (DOE))

In accordance with Section 504 of the Rehabilitation Act of 1973, as amended, Public Law 93-112, the Department of Energy will provide Interpreters for the Deaf/Hard of Hearing, Readers for the Blind, and Personal Assistants for Physically Disabled Headquarters employees and visitors either via the Headquarters staff interpreter or a qualified vendor.

411

Recovery Act State Summaries | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recovery Act State Summaries Recovery Act State Summaries Recovery Act State Summaries Alabama Recovery Act State Memo Alaska Recovery Act State Memo American Samoa Recovery Act State Memo Arizona Recovery Act State Memo Arkansas Recovery Act State Memo California Recovery Act State Memo Colorado Recovery Act State Memo Connecticut Recovery Act State Memo Delaware Recovery Act State Memo District of Columbia Recovery Act State Memo Florida Recovery Act State Memo Georgia Recovery Act State Memo Guam Recovery Act State Memo Hawaii Recovery Act State Memo Idaho Recovery Act State Memo Illinois Recovery Act State Memo Indiana Recovery Act State Memo Iowa Recovery Act State Memo Kansas Recovery Act State Memo Kentucky Recovery Act State Memo Louisiana Recovery Act State Memo Maine Recovery Act State Memo

412

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

413

NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission  

E-Print Network (OSTI)

Security Challenges: Abstract Submission Presentation Title: The Impact of Climate Variability on Biofuel liters in 1996 to 24.6 billion liters in 2007 (Renewable Fuels Association, 2008), and the target annual use of biofuels by 2022 specified in the 2007 Energy Independence and Security Act is 136 billion

Miami, University of

414

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

415

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

416

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

417

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

418

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

419

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

420

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

422

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

423

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

424

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

425

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

426

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

427

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

428

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

429

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

430

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

431

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

432

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

433

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

434

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

435

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

436

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

437

National Environmental Policy Act  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Policy Act Environmental Policy Act to. # LM-24-10 Legacy Management Project/Activity: Abandon four monitoring wells associated with the Rocky Flats, CO~ Site. A. Brief Projecti Activity Description The U.S. Department of Energy (DOE) Office of Legacy Management (LM) proposes to abandon four groundwater monitoring wells that were installed in the 1990s near the Rocky Flats, Colorado, Site. Three of the wells are adjacent to the Great Western Reservoir, and one is adjacent to Standley Lake; the attached map shows the well locations. Wells 11994~ 11894; and 49192 are in the city of Broomfield, and well 49292 is in the city of Westminster. The wells are no longer needed for groundwater monitoring purposes and are scheduled to be abandoned before the end of 20 1 0 and in accordance with regulations

438

National Environmental Policy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Policy Act (NEPA) Environmental Policy Act (NEPA) Public inquiries should be directed to: Gary S. Hartman DOE ORO NEPA Compliance Officer P.O. Box 2001, SE-32 Oak Ridge, TN 37831 (865) 576-0273 hartmangs@oro.doe.gov *Categorical Exclusion Determination Documents (CX Determinations): Date Title Reference No. Program 02/01/2010 Receipt and Processing of TRU Soils from Nuclear Fuel Services (NFS) in Erwin, Tennessee by the Transuranic (TRU) Waste Processing Center (TWPC) on the Oak Ridge Reservation, Tennessee CX-TWPC-09-0001 EM 02/01/2010 Conducting Macroencapsulation Treatment in the Parking Lot of the Contact Handled Marshalling Building (CHMB) at the TRU Waste Processing Center (TWPC) on the Oak Ridge Reservation, Tennessee CX-TWPC-09-0003 EM 03/02/2010 East Campus Parking Structure at the Oak Ridge National Laboratory (ORNL)

439

Fermilab | Recovery Act | Videos  

NLE Websites -- All DOE Office Websites (Extended Search)

Videos Videos Watch videos documenting progress on Fermilab projects funded by the American Recovery and Reinvestment Act. NOvA - Community Voices - September 2009 Residents of northern Minnesota and construction workers building the NOvA detector facility discuss the benefits the high-energy physics research project has brought their communities. Congressman Bill Foster at Fermilab Congressman Bill Foster speaks to Fermilab Technical Division employees and members of the media at a press conference on Wednesday, August 5 to announce an additional $60.2 million in Recovery Act funds for the lab. NOvA first blast On July 20, construction crews began blasting into the rock at the future site of the NOvA detector facility in northern Minnesota. NOvA groundbreaking ceremony

440

Fermilab | Recovery Act | Features  

NLE Websites -- All DOE Office Websites (Extended Search)

Features - Archive Features - Archive photo Industrial Building 3 addition Fermilab Today-November 5, 2010 IB3 addition nears completion The future site of Fermilab’s new materials laboratory space has evolved from a steel outline to a fully enclosed building over the past five months. Read full column photo Fermilab Today-October 22, 2010 Recovery Act gives LBNE team chance to grow Thanks to funding from the American Recovery and Reinvestment Act, the collaboration for the Long-Baseline Neutrino Experiment, LBNE, has expanded its project team. Read full column photo cooling units Fermilab Today-October 15, 2010 Local company completes FCC roof construction A local construction company recently completed work on the roof of the Feynman Computing Center, an important step in an ongoing project funded by

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

442

Recovery Act Workers Demolish Facility Tied to Project Pluto History |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Demolish Facility Tied to Project Pluto Demolish Facility Tied to Project Pluto History Recovery Act Workers Demolish Facility Tied to Project Pluto History Workers recently razed a facility used in the historic Project Pluto, the latest American Recovery and Reinvestment Act accomplishment helping clean up traces of past nuclear testing at the Nevada National Security Site (NNSS). Recovery Act workers safely hauled the last demolition waste from the Pluto Disassembly Facility to disposal facilities Jan. 11. The project is slated for completion this spring after workers finish installing a concrete cap over the below-ground level where the facility stood. Recovery Act Workers Demolish Facility Tied to Project Pluto History More Documents & Publications 2010 ARRA Newsletters 2011 ARRA Newsletters

443

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

444

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

445

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

446

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

447

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

448

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

449

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

450

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

451

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

452

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

453

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

454

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

455

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI für Informatik Univ. Tübingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

456

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

457

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

458

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

459

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

460

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

462

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

463

NNSA Policy System | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy System | National Nuclear Security Administration Policy System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NNSA Policy System Home > About Us > Our Operations > Management and Budget > NNSA Policy System NNSA Policy System The NNSA's Policy System is established under the authority of Section 3212(d) of Public Law 106-65, the National Defense Authorization Act for

464

Public Reading Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reading Facilities | National Nuclear Security Administration Reading Facilities | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Public Reading Facilities Home > About Us > Our Operations > NNSA Office of General Counsel > Freedom of Information Act (FOIA) > Public Reading Facilities Public Reading Facilities The FOIA and E-FOIA require that specific types of records as well as

465

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

466

Microsoft Word - NNSA Act 100110  

National Nuclear Security Administration (NNSA)

October 1, 2010 October 1, 2010 Source: Title XXXII of the National Defense Authorization Act for Fiscal Year 2000, Pub. L. 106-65, as amended by the Energy and Water Development Appropriations Act, 2001, Pub. L. 106-377; the Floyd D. Spence National Defense Authorization Act for Fiscal Year 2001, Pub. L. 106-398; the National Defense Authorization Act for Fiscal Year 2002, Pub. L. 107-107; the National Defense Authorization Act for Fiscal Year 2004, Pub. L. 108-136; the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005, Pub. L. 108- 375; the Energy Policy Act of 2005, Pub. L. 109-58; the John Warner National Defense Authorization Act for Fiscal Year 2007, Pub. L. 109-364; the National Defense Authorization Act for Fiscal Year 2008, Pub. L. 110-181; the Duncan Hunter National

467

Freedom of Information Act/Privacy Act Requests | National Nuclear...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information ActPrivacy Act Requests Home > About Us > Our Operations > NNSA Office of General...

468

Process Reform, Security and Suitability - December 17, 2008 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Process Reform, Security and Suitability - December 17, 2008 Process Reform, Security and Suitability - December 17, 2008 Process Reform, Security and Suitability - December 17, 2008 December 17, 2008 This is to report on the progress made to improve the timeliness and effectiveness of our hiring and clearing decisions and the specific plan to reform the process further, in accordance with our initial proposals made in April ofthis year. In response to significant, continuing security clearance timeliness concerns, Congress called for improvements and established specific timeliness goals as part of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA). Since the enactment of IRTPA, average timeliness for 90 percent of all clearance determinations reported has been substantially improved, from 265 days (in 2005) to 82 days (4th Quarter,

469

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

470

National Nuclear Security Administration Service Center  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Service Center Service Center P. 0. Box 5400 ~ ~ ~ A d M m t b n Albuquerque, NM 87185 MEMORANDUM FOR: Scott Blake Harris, General Counsel, GC- 1, HQ FROM: Karen L. Boardman, Director * * SUBJECT: Annual National Environmental Policy Act Planning Summary for FY 201 1 In response to your memorandum of December 8,201 0, attached is the 20 1 1 Annual National Environmental Policy Act (NEPA) Planning Summary. The information is provided for the National Nuclear Security Administration, Service Center (NNSAISC) in Albuquerque, NM. Furthermore, in reply to the question, "Would a site-wide environmental impact statement facilitate future NEPA compliance efforts?" The general operations of this site can be described as administrative similar to those operations within the Forrestal building in D.C. Therefore, a

471

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

472

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

473

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

474

Recovery Act | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recovery Act Recovery Act Recovery Act Center Map PERFORMANCE The Department estimates the $6 billion Recovery Act investment will allow us to complete work now that would cost approximately $13 billion in future years, saving $7 billion. As Recovery Act work is completed through the cleanup of contaminated sites, facilities, and material disposition, these areas will becoming available for potential reuse by other entities. Recovery Act funding is helping the Department reach our cleanup goals faster. Through the end of December 2012, EM achieved a total footprint reduction of 74%, or 690 of 931 square miles. EM achieved its goal of 40% footprint reduction in April 2011, five months ahead of schedule. Recovery Act payments exceeded $5.9 billion in December 2012. Recovery Act

475

Solid Waste Act (New Mexico)  

Energy.gov (U.S. Department of Energy (DOE))

The main purpose of the Solid Waste Act is to authorize and direct the establishment of a comprehensive solid waste management program. The act states details about specific waste management...

476

Montana Radon Control Act (Montana)  

Energy.gov (U.S. Department of Energy (DOE))

The Radon Control Act regulates the emission of radon, the gaseous decay products of uranium or thorium. The Act addresses operator certification of radon-producing facilities, testing and...

477

Clean Water Legacy Act (Minnesota)  

Energy.gov (U.S. Department of Energy (DOE))

This Act provides authority, direction, and resources to achieve and maintain water quality standards for groundwater and surface waters by implementing the federal Clean Water Act as well as...

478

Pollution Control Act (South Carolina)  

Energy.gov (U.S. Department of Energy (DOE))

This Act declares the maintenance of reasonable standards of purity of air and water to be the public policy of the state. The Act authorizes the Department of Health and Environmental Control to...

479

A systematic review of security requirements engineering  

Science Conference Proceedings (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

480

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

Note: This page contains sample records for the topic "maritime security act" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

482

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

483

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

484

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

485

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

486

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Mithra...

487

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

488

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

489

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

490

National Security & Safety Reports | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security & Safety Reports National Security & Safety Reports October 29, 2013 Evaluation Report: IG-0897 The Department of Energy's Unclassified Cyber Security Program -...

491

Security and Performance Considerations in Wireless Networks  

E-Print Network (OSTI)

ACM Workshop on Wireless Security, 2004. [3] ISM Wide-bandTraffic Flows. In Network Security Lab (NSL) Technicalthe Challenges of Security in a Mobile Environment. In

Pelechrinis, Konstantinos

2010-01-01T23:59:59.000Z

492

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

493

Security and United States Immigration Policy  

E-Print Network (OSTI)

Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

Totten, Robbie James

2012-01-01T23:59:59.000Z

494

Visitor_Security_and_Safety_Information  

NLE Websites -- All DOE Office Websites (Extended Search)

in a designated lot near the main lobby and auditorium. Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations United...

495

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

496

Lemnos Interoperable Security Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Program More Documents & Publications SECURITY CORE FUNCTION AND DEFINITION REPORT Lemnos Interoperable Security DOE National SCADA Test Bed Program Multi-Year Plan...

497

Security Orchestration with IF-MAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 7. ...

2012-10-26T23:59:59.000Z

498

Office of Headquarters Security Operations - Headquarters Facilities...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations HomeIntroduction Physical Security Limited Areas and Vault-Type Rooms Personnel Security Foreign Ownership, Control or Influence; Facility...

499

DOE Headquarters Security Quick Reference Book | Navigation  

NLE Websites -- All DOE Office Websites (Extended Search)

TECH. & INFO. SECURITY TEAM HOME COVER | INTRODUCTION SECURITY ACRONYMS TABLE OF CONTENTS HEADQUARTERS SECURITY OFFICER PROTECTIVE FORCE UNCLASSIFIED FOREIGN VISITS & ASSIGNMENTS...

500

Office of Headquarters Security Operations: Headquarters Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...